home *** CD-ROM | disk | FTP | other *** search
Text File | 1989-09-04 | 168.7 KB | 3,508 lines |
-
-
-
-
-
- **** * * * ******* TM
- * * * * *
- * * * * ** * * * *** * * * *** * ** *** **
- **** * ** * * * * * * * * * * * ** * * *
- * * * * * *** * **** * * * **** * * * *
- * * * * * * * * * * * * * * * * *
- **** * * * * * * **** **** * **** * * * *
- *
- Version 2.30 - User's Guide * September 4, 1989
- ***
-
-
-
-
- A Freely Available FidoNet Compatible Electronic
- Mail Interface and Dumb Terminal Package
-
-
-
-
- Software Written by Vince Perriello and Bob Hartman
- Documentation Written by Alan D. Applegate
-
-
-
-
- Copyright (C) 1988, 1989 Bit Bucket Software, Co.
- A Delaware Corporation
- All Rights Reserved
-
- Terms and Conditions Contained Separately
-
-
-
-
- Bit Bucket Software, Co.
- 427-3 Amherst St., Suite 232
- Nashua, NH 03063
-
-
-
-
- "BinkleyTerm" and "Freely Available"
- are trademarks of Bit Bucket Software, Co.
-
-
-
-
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 2
-
- TABLE OF CONTENTS
-
- Section 1 - General Information 4
- How to Use This Manual 4
- Acknowledgements 5
- Kudos 6
- Forward 7
- Introduction 8
- General Requirements 9
- Memory Requirements 9
- Modem Requirements 10
-
- Section 2 - Operation as a Terminal Communications Program 11
- Terminal Mode Overview 11
- VT-100 Emulation 12
- External Protocols 12
-
- Section 3 - Operation as a Automated Electronic Mailer 13
- Unattended Mode Overview 13
- The BinkleyTerm Concept 14
- How BinkleyTerm Handles Mail 14
- Idea #1 14
- Idea #2 15
- Idea #3 15
- Idea #4 15
- A Sample Message, Start to Finish 17
- The Concept of Cost 18
- Alternative Method 18
- Windowed Interface 19
- Current Settings 19
- Today at a Glance 19
- Pending Outbound Mail 20
- Recent Activity 21
- Transfer Status 21
- Control 21
- Errorlevels and Batch Files 22
- What is an Errorlevel? 23
- What Errorlevels BinkleyTerm Produces 24
- Making Errorlevels Work for You 26
- Errorlevels, Batch Files and ExtrnMail 26
- Errorlevels, Batch Files and Housekeeping 26
- DOS Shell Keys 26
- Using Errorlevels 27
- What Now? 27
- Errorlevel and Batch File Hints and Kinks 28
- Environment Variable 30
- Configuration File 30
- BTCTL 30
- Nodelist 31
- FIDOUSER.LST 31
- Version 5 Nodelist 32
- Version 6 Nodelist 32
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 3
-
- QuickBBS Nodelist 32
- TBBS Nodelist 33
- Nodelist Support Information 33
- Zone Support 34
- Multiple Network Operation 35
- Security 35
- Prot 36
- Known 36
- Default 36
- Security - Session Passwording 36
- Security - Secured Inbound File Areas 37
- Security - Controlling File Requests 38
- Security - Response File Templates 39
- BBS Interface 39
- BBS Exit 39
- BBS Spawn 40
- BBS Batch 40
- BBS Batch Method Flowchart 42
- Banner 42
- External Mail Programs 43
- User-Selected BBS Functionality 43
- File Requests 45
- Update Requests 47
- Request Response Files 48
- Function Requests 49
- $ Function Requests 49
- + Function Requests 50
- Function Request Notes 50
- A Word About Point Networks 51
-
- Section 4 - Problem Solving 52
- BinkleyTerm Support 52
- Troubleshooting 52
- Baud Rate Locking Trouble 52
- Outward Dial Aborting 52
- False Call Collision Reports 53
- FOSSIL Driver Compatibility Problems 53
- BinkleyTerm Will Not Recognize Node Address 53
- TBBS Difficulty - BinkleyTerm Runtime Errors 53
- DOS Shells Not Working Correctly 53
- Zone Support Does Not Operate Correctly 54
- Date Rollover Problem 54
- Glossary 54
-
-
-
-
-
-
-
-
-
-
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 4
-
- +-------------+
- | +---------+ |
- | | Section | | BinkleyTerm User's Guide
- | | 1 | | GENERAL INFORMATION
- | +---------+ |
- +-------------+
-
- HOW TO USE THIS MANUAL
-
- The documentation for BinkleyTerm is supplied in two parts.
-
- The User's Guide (named BT_USER.DOC) explains how to install
- BinkleyTerm. It also describes basic operational procedures.
- New users may find some concepts or terminology unfamiliar; a
- glossary is provided toward the end of the User's Guide.
-
- Concepts and terminology that may be of interest to experienced
- users and new users alike are covered in the Reference Guide
- (named BT_REF.DOC) an alphabetically arranged manual separate
- from the User's Guide.
-
- For inquiries, questions or comments regarding BinkleyTerm,
- please refer to the User's Guide section "BinkleyTerm Support."
-
- Some material in the section "How BinkleyTerm Handles Mail" is
- excerpted from MATRIX.DOC, and is Copyright (C) 1987 Wynn Wagner
- III, All Rights Reserved. Used by permission.
-
- Some material in the section "Control" was written by Ron
- McKenzie, and is Copyright (C) 1989 Ron McKenzie, All Rights
- Reserved. Used by permission.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 5
-
- ACKNOWLEDGEMENTS
-
- The following names are either trademarks, registered trademarks,
- and/or the efforts of the person and/or company named:
-
- Fido, FidoNet - Tom Jennings, Fido Software
- MS-DOS, Microsoft C - Microsoft Corporation
- IBM, PC-DOS - International Business Machines Corporation
- Opus-CBCS, ZedZap, YooHoo, WaZOO, OpusNode - Wynn Wagner III
- ARC, SEAdog, SEAlink, XlatList, ARCmail, GroupMail - Thom
- Henderson, System Enhancement Associates, Inc.
- VT-100, DEC, DEC Rainbow, VAX, VMS - Digital Equipment
- Corporation
- FANSI-CONSOLE - Hersey Micro Consulting
- Hayes - Hayes Microcomputer Products Corporation
- Zmodem - Chuck Forsberg, Omen Technologies, Inc.
- ConfMail, ParseLst, oMMM, Opus!Comm - Bob Hartman, Spark
- Software, Inc.
- oMMM - BS Software, Marshall Presnell, Jim Nutt
- msged - Jim Nutt
- XlaxNode - Scott Samet
- Heath/Zenith - Heath/Zenith Electronics, Inc.
- Sanyo - Sanyo Electric Co. (Japan) Ltd.
- DoubleDOS - SoftLogic Solutions, Inc.
- DESQview - Quarterdeck Office Systems, Inc.
- Telix - Colin Sampaleanu, Exis Inc.
- Sirius - Bob Klahn, Micro Solutions
- OOPS - Tom Kashuba
- AMAX - Alan Applegate
- Dutchie - Henk Wevers
- PC Pursuit - GTE/Telenet
- EchoMail - Jeff Rush
- ProComm - Datastorm Technologies, Inc.
- Qmodem - The Forbin Project
- TBBS - Phil Becker, eSoft, Inc.
- QuickBBS - Adam Hudson
- X00 - Ray Gwinn, RENEX Corporation
- DECCOMM - Vince Perriello, VEP Software
- Atari, ST - Atari, Inc.
- Commodore, Amiga - Commodore International
- USRobotics, HST - USRobotics, Inc.
- RBBS-PC - Capital PC Users Group, Thomas J. Mack
- FrontDoor - Joaquim Homrighausen
- D'Bridge - Chris Irwin
-
- Every effort has been made to identify and give credit for
- trademarks mentioned in this documentation. Any failure to
- mention a particular trademark in the above list that may be
- found in the text, or failure to give proper credit for a
- particular trademark, constitutes merely an oversight and should
- not be construed as intentional, or in any way a claim of rights
- to the trademark.
-
- PLEASE NOTE! Throughout this documentation, the mention of any
-
- BinkleyTerm Version 2.30 - User's Guide - Page 6
-
- particular software package or system should not be construed as
- an endorsement of any kind on the part of the authors.
-
- KUDOS
-
- A number of people have been involved in the creation,
- development and testing of this program, or have contributed to
- it in one way or another.
-
- Tom Jennings, of course, gets credit for creating the beast that
- brought us all together and defining the basic method of mail
- transfer that we still use. Wynn Wagner gets our thanks for
- releasing source code for his file transfer routines and sending
- some of his WaZOO source code as well for inclusion. Thom
- Henderson gets a humble tip of the hat for SEAdog, the
- prototypical mail-only front-end which was the basis for our
- front-end design, and for SEAlink, his extension of Xmodem/Telink
- which doubled the speed of network mail transfers overnight.
- Chuck Forsberg of Omen Technologies gets our thanks for
- developing and implementing the original Zmodem protocol.
-
- Then there are the guys who have put to the test everything the
- authors thought would be worthwhile, the BinkleyTerm Beta Test
- Team, members both past and present. Without you, who knows what
- we'd have wound up with.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 7
-
- FORWARD
-
- There is no question that BinkleyTerm is an extremely powerful
- communications tool. We also make no secret of the fact that
- BinkleyTerm is an extremely complex communications tool.
-
- A set of documentation the size of an unabridged dictionary
- (about 150mm thick or so) would still not address every possible
- use of BinkleyTerm in every possible environment. BinkleyTerm
- can run on a number of personal computer platforms - a total of
- several thousand brands and models. Hundreds of different modems
- can be used. It works with several operating environments such
- as DESQview and DoubleDOS. In addition, BinkleyTerm is designed
- with an open architecture, so it can be used with several BBS
- packages, nodelist processors, mail processors, editors, and so
- on. BinkleyTerm "ports" have been made for entirely different
- platforms such as the Atari ST, Commodore Amiga and VAX/VMS based
- systems. You begin to get the scope of what's involved.
-
- This documentation attempts to cover fairly broad generalities in
- configuring and operating BinkleyTerm. It cannot and will not
- cover all possibilities or circumstances. Hopefully it will
- serve as a starting point - a ground level from which you may
- grow and expand. Further, this documentation describes only the
- version of BinkleyTerm provided by the original authors - that
- which runs in the PC-DOS/MS-DOS environment.
-
- Most of the enjoyment of the electronic mail hobby comes from
- trying new things - tweaking the system. Although BinkleyTerm is
- a dependable, powerful program that is not especially difficult
- to get going, it does provide ample opportunity to experiment and
- have fun.
-
- Still, if you're looking for something that will meld itself into
- your computer in just a few minutes and work without modification
- forever more, BinkleyTerm should probably not be your first
- choice. In exchange for a little complexity, we give you power
- and an incredible amount of configurability and compatibility.
-
- If you become frustrated with BinkleyTerm, call on others in your
- area who have configured it for an environment similar to yours.
- We estimate that several thousand people around the world are
- BinkleyTerm users, and someone close to you in your network no
- doubt runs BinkleyTerm. With an architecture as open as that of
- BinkleyTerm, your best source of information is someone who has
- the benefit of time and experience configuring it. Of course,
- you will eventually become an expert yourself! Enjoy it, and
- delight in the wonder of technology.
-
- Alan D. Applegate,
- Vice-President,
- Bit Bucket Software, Co.
-
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 8
-
- INTRODUCTION
-
- BinkleyTerm is an advanced, state-of-the-art telecommunications
- tool. It is primarily designed for the semi-automated sending
- and receiving of electronic mail and files within FidoNet-
- compatible electronic mail networks.
-
- When used as a mailer, BinkleyTerm is designed to communicate
- with any FidoNet-compatible mail interface or BBS package. The
- program uses standard FidoNet protocol, as well as certain
- modified protocols supported by programs such as SEAdog and Opus-
- CBCS. It also offers easy-to-use event scheduling, single
- keystroke spawning to other programs (DOS shell), excellent
- support for high speed modems, advanced session recovery, inbound
- call collision detection, and much more.
-
- When used as a dumb terminal, BinkleyTerm offers a rich selection
- of file transfer protocols for exchanging files with a host
- system. The program also offers keyboard macros, optional VT-100
- emulation, echoing of the on-line session to a flat text file or
- printer, support for baud rates of 300 to 38,400 and more.
-
- BinkleyTerm can be used as a dumb terminal program exclusively,
- as a mail interface for a Point system, or as a front end mail
- interface for an electronic bulletin board system (BBS).
-
- Mail interface and dumb terminal operations can be switched in
- and out with a minimum of effort providing dual functionality.
-
- BinkleyTerm is one of several software packages to utilize the
- FOSSIL standard communications driver. This standard allows for
- consistent console (keyboard and screen) and communications port
- I/O operations. By using a FOSSIL driver, BinkleyTerm is capable
- of running on practically any MS-DOS/PC-DOS capable machine, even
- those that are not 100% IBM hardware compatible.
-
- BinkleyTerm endeavors to provide you with the widest possible
- variety of advanced features, combined with solid and efficient
- operation in a wide range of hardware environments.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 9
-
- GENERAL REQUIREMENTS
-
- - A personal computer running MS-DOS or PC-DOS, with at
- least 256k of available RAM.
-
- - MS-DOS or PC-DOS, Version 2.10 or greater, Version 3.20 or
- higher preferred.
-
- - An auto-dial, auto-answer modem; should be mostly "Hayes
- compatible." See "Modem Requirements" below.
-
- - A FOSSIL driver designed for your particular hardware.
-
- - One 360k floppy disk drive (Terminal Mode).
-
- - At least two 360k floppy disk drives, more space and/or
- hard disk recommended (Unattended Mode).
-
- - Basic knowledge of computer-based telecommunications,
- without which you would have no need for BinkleyTerm.
-
- Please note that when using BinkleyTerm as a front-end mailer for
- a BBS system, a hard disk is required. The more space you have
- for such an operation, the better off you'll be.
-
- You will also need various utilities and adjunct programs, which
- vary with your application.
-
- MEMORY REQUIREMENTS
-
- BinkleyTerm requires approximately 185k of RAM in any operational
- mode with the non-overlay version (BTBIG.EXE) and somewhat less
- for overlay version (BT.EXE). When used for Unattended Mode,
- additional memory sufficient to hold the nodelist index file
- (usually NODELIST.IDX) will also be required. Keep in mind that
- a small amount of overhead will also be required to accommodate a
- FOSSIL driver, as well as a VFOSSIL if one is used. At least a
- 512k system is recommended when using DOS shells, or when
- BinkleyTerm is used in a multi-tasking environment. BinkleyTerm
- should, however, be completely functional even on a system with
- only 256k of RAM.
-
- BinkleyTerm is not currently capable of taking direct advantage
- of extended (AT style) or expanded (EEMS, EMS 4.0) memory, and
- having such memory installed will not be of direct benefit to
- BinkleyTerm. Some multi-taskers, such as DESQview, are able to
- take advantage of such memory to BinkleyTerm's ultimate benefit.
- Please note, however, that when using the 'SwapDir' configuration
- file statement, a RAM disk with at 150k of available space is
- highly recommended for efficient operation. Typically RAM disks
- can be placed in extended or expanded memory. Refer to the
- Reference Guide section "Configuration File" for details on the
- 'SwapDir' statement and its use.
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 10
-
- When used as a front end mailer for a BBS system, it is HIGHLY
- RECOMMENDED that the 'BBS Batch' method of accessing your BBS be
- implemented for the most efficient use of memory. Please refer
- to the applicable sections of the documentation for further
- information.
-
- MODEM REQUIREMENTS
-
- A modem that is generally "Hayes compatible" is required for
- BinkleyTerm operation. Such modems are typically referred to as
- "smart" modems. Most popular, late model modems you're apt to
- own meet this requirement. Since you configure the various modem
- command strings, the modem does not need to be 100% Hayes "AT"
- command set compatible, but it does need to use the "AT" style of
- issuing modem commands.
-
- Most smart modems are capable of returning VERBAL (full words) or
- NUMERIC (numbers only) response codes; the modem must be
- configured in such a way as to use the VERBAL codes ONLY.
-
- BinkleyTerm can be operative if the modem supports just one modem
- response string - CONNECT. (See below for qualifications
- required of the CONNECT string.)
-
- BinkleyTerm has been programmed to handle and respond
- appropriately to the following modem response strings: NO
- ANSWER, BUSY, RING, VOICE, NO DIAL TONE, NO DIALTONE, ERROR, NO
- CARRIER, DIAL TONE and DIALING.
-
- The following response strings are recognized, but are ignored:
- RRING, RINGING and RING RESPONSE.
-
- With the exception of the CONNECT response, any other data
- provided by the modem after a given response string is ignored.
- For example, "NO CARRIER DETECTED" would be handled in the same
- manner as a "NO CARRIER" response.
-
- Since BinkleyTerm uses the CONNECT string to determine connection
- baud rates, the modem should be capable of sending such strings.
- Generally, CONNECT is a default, and indicates a 300 baud
- connection. Other possible connections should be CONNECT 1200
- for a 1200 baud connection, CONNECT 2400 for a 2400 baud
- connection, and so on, up to the maximum supported speed.
-
- Note also that BinkleyTerm recognizes the response CONNECT 1275
- for split-speed modems.
-
- If you are experiencing modem difficulties, try one or all of the
- following configuration file statements: 'SlowModem', 'SameRing'
- and/or 'NoCollide'. Additionally, not all modems are capable of
- using the 'Answer' statement and its related modem configuration.
- Explanations of all these statements can be found in the
- Reference Guide section, "Configuration File."
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 11
-
- +-------------+
- | +---------+ |
- | | Section | | BinkleyTerm User's Guide
- | | 2 | | OPERATION AS A TERMINAL COMMUNICATIONS PROGRAM
- | +---------+ |
- +-------------+
-
- TERMINAL MODE OVERVIEW
-
- This section describes the installation and operation of
- BinkleyTerm in the Terminal Mode.
-
- BinkleyTerm's Terminal Mode offers functionality similar to that
- provided by programs such as Telix, ProComm or Qmodem. You can
- use your computer and modem to call out to on-line services and
- electronic bulletin board systems (BBS).
-
- BinkleyTerm offers a full selection of file transfer protocols
- for use in exchanging files with remote systems. Also offered is
- optional VT-100 terminal emulation, an open architecture for
- adding additional file transfer protocols, support for high speed
- modems up to 38,400 baud, session logging to a flat file or
- printer, and more.
-
- BinkleyTerm also features Zmodem Auto-Downloads. Once the
- transfer begins at the remote host, BinkleyTerm will detect the
- unique Zmodem start-of-transfer signal, and will immediately go
- into Zmodem download mode. If for some reason the Auto-Download
- does not occur, a Zmodem download can always be initiated
- manually.
-
- To install and operate BinkleyTerm for use exclusively in
- Terminal Mode, follow these steps.
-
- - Prepare disk media. Create a sub-directory on your hard
- disk, or format a single diskette.
-
- - Move the software to the newly prepared media.
-
- - With a standard text editor, or with DOS' EDLIN command,
- edit the sample configuration file, BINKLEY.CFG, included in
- the distribution archive or diskette. The parameters needed
- are outlined in the file itself on comment lines, or you may
- refer to the Reference Guide for more information.
-
- - Obtain and properly install a FOSSIL driver in accordance
- with the directions included with your driver. (Refer to
- the Glossary for more information on FOSSIL drivers.)
-
- - Invoke BinkleyTerm (enter 'BT' on the command line).
-
- - Press Alt-F10 for a brief help screen.
-
- The various keystrokes available in Terminal Mode are covered in
-
- BinkleyTerm Version 2.30 - User's Guide - Page 12
-
- detail in the Reference Guide.
-
- VT-100 EMULATION
-
- VT-100 terminal emulation is provided optionally by BinkleyTerm.
- Outward keystrokes are always active with the VT-100 keypad
- mapping (as shown in the Reference Guide). However, incoming
- screen control codes require ANSI X3.64 support, such as that
- provided in firmware on a DEC Rainbow computer.
-
- For users of IBM PC computers and compatibles, external ANSI
- support is required, as provided by FANSI-CONSOLE, a separately
- available utility. Load FANSI-CONSOLE in accordance with its
- directions prior to running BinkleyTerm for full VT-100 terminal
- emulation.
-
- EXTERNAL PROTOCOLS
-
- BinkleyTerm provides a rich selection of file transfer protocols,
- hard coded for ease of use and efficient operation. On occasion
- however, other protocols may also be desired.
-
- BinkleyTerm supports special external file transfer programs that
- conform to the standard used by Opus-CBCS. External file
- transfer protocols MUST identify themselves as being compatible
- with Opus-CBCS in order to work with BinkleyTerm. Such protocols
- are often available from Opus-CBCS systems.
-
- Protocols currently available include WXmodem, Kermit and others.
- To use such an external protocol, add a 'Protocol' statement to
- your configuration file along with the required path information,
- as illustrated in the Reference Guide section "Configuration
- File."
-
- Some of the Opus-CBCS compatible protocols are specially designed
- and optimized for BBS use, and may not be operable in
- BinkleyTerm's Terminal Mode. Check the individual package for
- information, or test the performance of the package on your own.
-
- "True" external protocols, those that are designed to be accessed
- by any communications program via a DOS shell, can also be used
- with BinkleyTerm. BinkleyTerm provides a DOS shell command that
- can be invoked during a communications session. An external
- protocol of this type can then be executed from the DOS command
- line, or from a batch file, depending on your situation.
- External protocols such as Jmodem and BiModem can be accessed in
- this manner.
-
-
-
-
-
-
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 13
-
- +-------------+
- | +---------+ |
- | | Section | | BinkleyTerm User's Guide
- | | 3 | | OPERATION AS AN AUTOMATED ELECTRONIC MAILER
- | +---------+ |
- +-------------+
-
- UNATTENDED MODE OVERVIEW
-
- This section describes the installation and use of BinkleyTerm in
- Unattended Mode. This mode is used when BinkleyTerm is to
- function as a front-end mail interface, whether in a BBS or
- "Point" environment. The Glossary provides information on BBS
- and Point systems.
-
- BinkleyTerm, in this operational mode, provides functionality
- similar to that provided by programs such as SEAdog, Dutchie,
- FrontDoor, D'Bridge and other FidoNet compatible mailers.
- BinkleyTerm answers the telephone, and exchanges mail with other
- compatible mail interface packages, or in the case of a human
- caller, passes control of the connection to a BBS system.
-
- Due to the complexity and widely varying combinations of hardware
- and software, only a generalized, broad explanation of the
- installation procedure can be given.
-
- - Prepare your disk media. Normally, this would involve
- selecting and/or creating a hard disk sub-directory.
-
- - Move BinkleyTerm and the distribution files to this new
- directory.
-
- - Using any standard text editor, make the necessary changes
- to the configuration file included with the distribution
- archive or package. Refer to the Reference Manual section
- "Configuration File" for more information.
-
- - Run the BTCTL program included in the distribution
- package.
-
- - Obtain and install a FOSSIL driver. Refer to the Glossary
- for more information.
-
- - Obtain the necessary utilities and programs for packing
- and unpacking mail. Install them in accordance with the
- instructions included with each package.
-
- - If you're a fully qualified FidoNet node (not a Point),
- obtain a current nodelist. Process it into usable form.
-
- - Make the appropriate changes to an existing batch file
- used to start your BBS. If the installation is completely
- new, or if your BBS does not use a batch file, create one.
- Refer to the section "Control" for more information.
-
- BinkleyTerm Version 2.30 - User's Guide - Page 14
-
-
- - Start your system. Test a remote call if possible.
-
- - Alt-F10 displays a brief help file of commands available
- in Unattended Mode.
-
- THE BINKLEYTERM CONCEPT
-
- It is important to remember that BinkleyTerm is a mailer program
- with a completely open architecture. As such, BinkleyTerm can be
- operated with a tremendous variety of BBS systems, mail packing
- and unpacking programs, and accessories.
-
- BinkleyTerm will answer the telephone and respond to another mail
- program. Mail will be placed in an incoming files area. If the
- caller is human, control is passed entirely to the BBS program,
- if one is installed. It is the responsibility of third-party
- software to unpack the mail received, and add it to your message
- base.
-
- On the outward side, BinkleyTerm uses an outbound holding area to
- hold outward mail. It is the responsibility of third-party
- packing software to pack new messages into the required format,
- and place them in the outbound area.
-
- BinkleyTerm neither packs nor unpacks mail. Allowing this
- functionality to be provided by other software allows BinkleyTerm
- to be compatible with practically any BBS software, regardless of
- message base structure.
-
- For mail handling, you might use programs such as ConfMail and
- oMMM to process mail, along with programs such as Sirius or msged
- to read and enter messages, or allow your users to do so in a BBS
- installation such as Opus-CBCS or Fido. Some BBS packages, such
- as TBBS and QuickBBS come complete with their own proprietary
- packing and unpacking software. Finding the utilities and
- programs needed to work with your system is your responsibility.
-
- HOW BINKLEYTERM HANDLES MAIL
-
- Sending outbound mail with BinkleyTerm is fairly simple. The
- concept of mail handling with BinkleyTerm is the same concept
- that Opus-CBCS uses. If you're already familiar with Opus, then
- BinkleyTerm will fall into place easily. If you are a complete
- neophyte, this section is intended to give you an understanding
- of the concept.
-
- Idea #1
-
- Mail events are less important than they are with other mailing
- methods and systems. With BinkleyTerm's events, you paint with a
- wide brush telling the system what to do with 'classes' of remote
- systems.
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 15
-
- When systems handled mail only at specific times, routing and
- times were of great importance. Because more and more systems
- can process mail at any time, the idea of a schedule becomes less
- important. The item of prime importance with BinkleyTerm is
- COST. We are going to try and relieve you of the tedious details
- of scheduling, and concentrate on doing things for the least
- cost. More on this later.
-
- Idea #2
-
- Another new idea deals with the way that packets are created.
-
- If you have used other mailer systems, you're probably used to
- seeing packets generated several times. With some programs,
- packets are built every time a mail schedule starts. As a
- result, one message may be put into a packet several times.
-
- With BinkleyTerm, packets are built once by an external mail
- packing program. Most often, this is a program called oMMM.
- They may be remarked and rerouted once they're built, but they
- are physically built only once, and placed in a special sub-
- directory called the outbound holding area.
-
- NOTE: oMMM stands for Opus Matrix Message Masher, and was
- originally designed for use with the Opus-CBCS system as its
- packer. BinkleyTerm is able to use oMMM because it chose to
- implement the holding area in a compatible (although not
- identical) way. oMMM may not have to be used at all; in some
- cases, the mail packing program for your particular environment
- may handle oMMM-like functions internally.
-
- Idea #3
-
- BinkleyTerm uses 'Continuous Mail.' If you are already using a
- program that supports 'Crash Mail' then you understand a little
- of what Continuous Mail does. Continuous Mail differs from Crash
- Mail in a couple of areas.
-
- In other mailer systems, you would mark a message as 'Crash'
- meaning that you wanted this message to go out NOW. These mailer
- programs would shut down human caller access to the BBS and try
- like heck to get the message through.
-
- BinkleyTerm uses Continuous Mail, meaning that this is a message
- going to a system that can accept mail at any time of day.
- BinkleyTerm makes no frantic attempts to dial out, rather it will
- try and deliver the message between callers.
-
- Idea #4
-
- The driving forces of outbound traffic are file names!
-
- You'll have a special sub-directory set aside just for packets,
- compressed mail packets and other network files. This sub-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 16
-
- directory belongs to BinkleyTerm, which will maintain the
- directory for you. It's a good idea not to play with this area
- unless you know exactly what you're doing.
-
- Note also that when zoned operation is active (BinkleyTerm
- default) there are separate outbound areas for each zone. The
- default outbound area (for your zone) and one additional area for
- each other zone you deal with. The names of these additional
- areas are simply the outbound area name, with a three-digit
- extension that is the zone number in hexadecimal with leading
- zeroes. See "Zone Support" for information.
-
- The file names of the packets tell BinkleyTerm how to treat the
- different packets. Here's a typical packet name:
-
- 00680024.OUT
-
- That says that the packet is for 0068/0024 (in hexadecimal) or
- 104/36 in more familiar terms. The ".OUT" means it is a Normal
- packet.
-
- Other packet extensions include:
-
- .HUT . . . Hold this packet for pickup by the remote system.
- .CUT . . . The other system can receive Continuous Mail.
- .DUT . . . Direct, meaning the other system can NOT receive
- Continuous Mail.
-
- One nice thing is that you can manually change the file extension
- if you need to, or you can use fancy utilities such as AMAX to do
- this sort of thing for you on your command.
-
- For the remainder of this section, we'll assume that you'll be
- using oMMM as your mail packer. As mentioned previously, you may
- be using another program that has oMMM-like functionality; it
- depends on your environment.
-
- The oMMM program knows about these extensions and creates them
- based on information you put into the oMMM control file. You'll
- have statements like this:
-
- NormHold 124/102
-
- Any messages you enter to 124/102 would be turned into a .HUT
- packet file, placed into the outbound area, and BinkleyTerm would
- hold that packet for 124/102 to call and pick it up.
-
- Files are also sent through FidoNet compatible networks. oMMM
- builds and maintains a file that tells BinkleyTerm what files to
- send (or hold) for whom. A typical 'file attach' file might be
- named:
-
- 00680024.FLO
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 17
-
- This would designate a that there is a file waiting to be sent to
- 0068/0024 (in hexadecimal) or 104/36 in more familiar terms. The
- ".FLO" says it is a Normal file attach. File attach files are
- also called 'flow files' - named after the .FLO file extension.
-
- Other flow file extensions are:
-
- .HLO . . . Hold these files for pickup by the remote system.
-
- .CLO . . . The other system can receive Continuous Mail.
- .DLO . . . Direct, meaning the other system can NOT receive
- Continuous Mail.
-
- A flow file is just a text file. It contains a list of files
- that are to be sent to another system:
-
- #c:\binkley\outbound\0000fc9c.mo1
- ^c:\myfiles\wizzle.doc
- c:\pascal\notes.doc
-
- The '#' prior to a flow file entry says to truncate the file to
- zero-length after successfully sending the file to the remote
- system. This is normally only employed when sending compressed
- mail (archived mail) to the remote. The '^' prior to a flow file
- entry says to delete the file after sending.
-
- The oMMM program will put messages into archives for you.
- Details on how this is done can be found in the oMMM
- documentation. The point is that oMMM combines the functionality
- of "generating packets" with that of programs like ARCmail.
-
- A Sample Message, Start to Finish
-
- So here's a practical example. Say I enter a message to Rod
- Lamping at 104/610. I mark the message as KILL/SENT when I enter
- it. I also enter the message designating a file to attach to
- Rod, named C:\FILE\REQ\FOOBAR.ARC.
-
- I then enter a message in an EchoMail conference. My conference
- host is Phil Kaiser at 104/904, for whom I hold my mail for
- pickup.
- Among other things, I have two lines in my oMMM control file:
-
- NormCM 104/610
- OneHold 104/904
-
- 'NormCM' tells oMMM to mark the message as Continuous Mail (since
- Rod runs a mailer 24 hours a day). 'OneHold' tells oMMM to
- archive the mail to 104/904, and mark it Hold-for-Pickup. Refer
- to the oMMM documentation for the full set of available oMMM
- control file statements.
-
- First, my EchoMail utilities are run to turn EchoMail messages
- into Normal packets, and place them in the outbound area for
-
- BinkleyTerm Version 2.30 - User's Guide - Page 18
-
- processing by oMMM. Next, I execute oMMM. It first scans the
- NetMail message area (where I entered my message to Rod) and
- turns new messages there into Normal packets, and if there are
- files attached, it creates Normal flow files. oMMM's second step
- is to use its control file, and apply the statements in the file
- against the mail in the outbound area that is marked as Normal.
-
- Since I have Rod's board listed as NormCM, oMMM renames the file
- extension of the Normal packet and flow file for Rod to .CUT and
- .CLO respectively, for Continuous Mail. Since I have Phil's
- board listed as OneHold, first oMMM archives the packets to Phil,
- then creates a flow file with a file extension of .HLO for Hold-
- for-Pickup.
-
- I would then have the following in my outbound area:
-
- 00680262.CUT Message to Rod
- 00680262.CLO Flow File to Rod
- 00680388.HLO Flow File to Phil
- 0000FC9C.MO1 Archived Message to Phil
-
- For more information on how oMMM works, refer to the oMMM
- documentation.
-
- The Concept of Cost
-
- As mentioned earlier, one of the prime considerations with
- BinkleyTerm is sending mail for the least cost. Cost is, of
- course, determined by the nodelist entry. With a properly
- compiled nodelist, local FidoNet nodes have '0' in the cost field
- for their nodelist entry (assuming local calls are free of
- charge). Other entries have cost fields that realistically
- reflect the actual cost of sending mail to a particular node.
-
- In most areas, it is cheapest to send toll calls during nighttime
- house. Therefore, BinkleyTerm is normally set-up to send such
- mail only during nighttime hours.
-
- The 'L' flag used when scheduling events designates 'local only.'
- As already mentioned, nodes with a '0' cost field are assumed to
- be local. When the flag is applied to an event, only local calls
- are made. The 'L' flag should be used whenever it costs the most
- money to make toll calls, and removed for events during which
- toll calls are cheapest. More about this is in the Reference
- Manual section, "Scheduling Events."
-
- Alternative Method
-
- Randy Bush of 1:105/6 has assembled a package called MOOO which
- allows the Dutchie mail packer to be used with BinkleyTerm. This
- will allow routing commands familiar to grizzled FidoNet veterans
- to be used with BinkleyTerm.
-
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 19
-
- WINDOWED INTERFACE
-
- BinkleyTerm features a windowed user interface. The windowed
- interface provides "at-a-glance" convenience for watching mail
- sessions in progress, as well as determining what activity has
- taken place with the system recently.
-
- If a Video FOSSIL (VFOSSIL) is installed, the windowing
- operations can take place much faster than they would without
- one. It is recommended that a VFOSSIL be used with BinkleyTerm.
-
- Some more recent VFOSSIL implementations may also allow
- BinkleyTerm to be used on EGA and VGA systems in extended text
- modes of 132 columns by 43 lines. The mode switching must be
- performed by the utility software that accompanied your video
- card prior to invoking BinkleyTerm.
-
- There are five information windows displayed on-screen.
-
- Current Settings
-
- This window contains various information about your system,
- including the current date and time, current event, port and
- current baud rate, status and multi-tasker type, if any.
-
- The current event line features a number, and a list of event
- flags. The number corresponds to which entry in the BinkleyTerm
- configuration file contains the line that covers the current
- event. The first 'Event' statement in the configuration file
- would be event 1, the second would be event 2, and so on. The
- flags are letters that are a subset of those used with event
- scheduling. Here is a list of letters that may be found in this
- window:
-
- C Continuous Mail Only Event
- L Local Only Event
- N Do Not Accept Inbound File Requests
- R Receive Only Event
- B BBS Use Allowed
- D Dynamic Event
- K Do Not Send to #CM Nodes
-
- Note that not all event flags will be displayed in the window.
- For complete details and use information, see "Scheduling Events"
- in the Reference Guide.
-
- Today at a Glance
-
- This window contains several lines of information regarding the
- activity on your system since midnight. Note that the totals
- given apply only to calls handled by BinkleyTerm's Unattended
- (mailer) Mode, and do not include Terminal Mode totals.
-
- The first line, "BBS/Mail," lists how many bbs calls and mail
-
- BinkleyTerm Version 2.30 - User's Guide - Page 20
-
- calls have come in, separated by a slash. For example, 2/15
- would indicate 2 BBS calls and 15 mail calls since midnight.
-
- The second line, "Calls Out," lists the number of dial attempts
- that have been made by your system, successful or otherwise.
-
- The third line, "Good/Cost," shows how many successful outward
- connects have been made and the cumulative cost of all the
- successful calls, separated by a slash. For example, 3/100 would
- indicate that 3 successful outbound calls have been placed, and
- that together, they cost 100 units (in the United States, units
- are cents, which would mean that the cost was 100 cents or
- $1.00). The cost is calculated based on the cost shown in your
- compiled nodelist files; the cost shown there is assumed to be a
- per-minute value in calculating a per-call cost.
-
- The fourth line, "Files I/O," shows how many files (packets,
- compressed mail or other incoming files) have been received and
- sent, separated by a slash. For example, 12/3 would indicate
- that 12 files have been received, and 3 have been sent.
-
- Finally, the fifth line indicates the type of last call. If the
- last call was incoming, the display will indicate whether the
- call was a BBS call, external mail call, or the node address will
- be displayed if it was a mail call. If the last successful call
- was outgoing, the node address will be displayed.
-
- Pending Outbound Mail
-
- This window displays a list of systems for whom mail is pending,
- along with related information. The window can be scrolled using
- PgUp, PgDn, Home, End, Up-Arrow and Down-Arrow keys. The top
- line of the window lists the node that is being called, or was
- just called. The second line lists the node that will be called
- next.
-
- Various information about the mail for the various nodes is also
- displayed. The columns are marked by a single letter. The
- column letters and their meaning are:
-
- C Continuous Mail
- H Hold-for-Pickup Mail
- D Direct Mail
- N Normal Mail
- R File and/or Update Request
- S Status
-
- The symbol shown under the C, H, D, N and R columns is:
-
- * Mail of This Type Pending
-
-
-
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 21
-
- The symbols shown under the S column are:
-
- x Too Many Bad Connects (Undialable)
- # Already Called, But Mail Still Pending
- - Cannot Call During This Event
- ! Node Not Found in Nodelist
-
- When BinkleyTerm is making an outbound call, the node you are
- calling is highlighted in the Pending Outbound Mail window. This
- allows you to know which node has been called, even after the
- pertinent information has scrolled out of the Recent Activity
- window (described below). This feature can also be helpful in
- determining whether an active mail session was initiated by you,
- or was started by an incoming call.
-
- The outbound area is re-scanned for new additions under the
- following circumstances:
-
- - After a keyboard shell has been invoked
- - After 'AfterMail' is run (if designated)
- - After 'Packer' is run (if designated)
- - After message editor (Alt-E) has been run
- - After 10 minutes of no activity
-
- Note the 'AfterMail', 'Packer' and 'Reader' (message editor) are
- designated in the configuration file. Refer to the Reference
- Guide section "Configuration File" for additional information.
-
- Recent Activity
-
- This window is similar to the main section of previous
- BinkleyTerm displays, in that it gives various information about
- what the system is currently doing, or has just done. This
- includes identification of the remote system, the type of
- connection, what files were transferred, etc.
-
- Any feedback available about the current or recent activity of
- the system is shown in this window.
-
- Transfer Status
-
- This window gives particulars about current file transfers that
- may be taking place if a connection is active. For WaZOO/ZedZap
- connections, this includes filename and the number of bytes
- transferred; for other connections, the number of blocks
- transferred may be given.
-
- CONTROL
-
- In Unattended Mode, BinkleyTerm is normally used with batch files
- that control system operation. You'll have a batch file used to
- invoke BinkleyTerm and invoke system utilities such mail
- processors.
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 22
-
- Since BinkleyTerm can be used in such a wide variety of
- situations, there is not a particular "correct" or "incorrect"
- way to configure BinkleyTerm. The remainder of this section
- explains some of the operational theory and methods behind batch
- processing as it applies to BinkleyTerm.
-
- If you are adding BinkleyTerm to an existing FidoNet compatible
- BBS system, chances are excellent that you are already familiar
- with batch files and the various tricks that they must typically
- perform in a FidoNet environment.
-
- If advanced batch processing is beyond your scope, it is highly
- recommended that you review your DOS manual, or the numerous
- third-party DOS usage guides for information to get you started.
-
- One of the fundamentals of using batch files with BinkleyTerm is
- the concept of the 'errorlevel.' This DOS environment variable
- is set to a given value when a program completes execution. A
- batch file can detect and act upon the value, branching to
- various parts of the batch file. This section provides many good
- tips and ideas for errorlevel and batch file processing. Also
- consult your DOS manual for additional information.
-
- A practical application might be after BinkleyTerm receives mail.
- BinkleyTerm would exit to the batch file, setting the errorlevel
- to a predetermined value. The batch file detects the value, and
- branches to a section in the batch file where mail unpacking
- programs are invoked. The batch file would then be restarted,
- invoking BinkleyTerm to again wait for or send mail.
-
- NOTE: The remainder of the "Control" section was
- written by Ron McKenzie of 1:104/45.1. My gracious
- thanks to him for the insights presented here, and for
- the time he contributed to its composition. This
- section was sorely needed (and requested) by many
- BinkleyTerm users.
-
- - Alan D. Applegate
-
- Errorlevels and Batch Files
-
- Errorlevels present a difficult hurdle to the new user of
- BinkleyTerm, especially those with no experience operating a BBS
- or a Point. In addition, BinkleyTerm's great flexibility
- confuses some Sysops. Few things are "fixed" or "cast in
- concrete." This section attempts to draw together pertinent
- information from many sources relating to errorlevels and their
- use in crafting a batch file to operate a BBS or a Point. Also
- presented are some accumulated bits of wisdom gathered by the
- author in the course of creating his own Point.
-
- This section looks at what errorlevels are, which errorlevels are
- returned by BinkleyTerm, distinguishes between those errorlevel
- values set by BinkleyTerm and by the user, shows how you use
-
- BinkleyTerm Version 2.30 - User's Guide - Page 23
-
- errorlevels in your batch file and, finally, offers some hints
- and shortcuts.
-
- What is an "Errorlevel?"
-
- An errorlevel is a numeric value which a program may "return"
- when it terminates. The name is misleading because the value
- returned is really an exit code, rather than an indication of an
- error per se. It distinguishes different types of normal exits,
- in addition to denoting an abnormal condition on exit. The
- software's creator (or, in some instances, the program's user)
- sets the value(s).
-
- Errorlevels permit the user to craft a batch (.BAT) file, using
- DOS batch commands such as IF and GOTO, to logically organize the
- BBS or Point operating process. Automagically, this batch file
- determines which tasks need be performed and in what order. It
- branches between tasks based on the exit code generated by each
- program and on the program logic created by the Sysop.
-
- For example, an editor might return the following:
-
- Exit
- Code Condition
- ---- ----------------------------
- 3 EchoMail and NetMail Created
- 2 EchoMail Only Created
- 1 NetMail Only Created
- 0 No Mail Created
-
- For another example, the ConfMail mail processing program returns
- the following errorlevels in the Import mode:
-
- Exit
- Code Condition
- ---- ----------------------------
- 2 Severe Error in Processing
- 1 Messages Were Imported
- 0 No Messages Imported
-
- Branching or jumping within the batch files is facilitated with
- the use of labels. A label is used to identify a particular
- block within the batch file. For example, you might choose to
- label a portion of your batch file "nodelist" because that
- particular section of the file handles nodelist processing.
-
- Labels are designated with a colon, followed by the label name.
- You may wish to identify the top of the file with a label to make
- re-starting the batch file as easy as using a GOTO statement.
-
- Here is a short example of the use of labels:
-
- :start
- myprog -p1
-
- BinkleyTerm Version 2.30 - User's Guide - Page 24
-
- if errorlevel 2 goto process
- if errorlevel 1 goto start
- if errorlevel 0 goto end
-
- :process
- proc -c -d1
- if errorlevel 1 goto start
- if errorlevel 0 goto end
-
- :end
-
- Note that the top of the file is identified by a label named
- "start" and that other sections are labeled as well. The batch
- file starts out by invoking a program called MYPROG. Once MYPROG
- exits, the errorlevel values determine where in the file that
- control will be passed. One errorlevel references another label
- that in turn will cause a program named PROC to be run. Another
- branch goes back to the top of the file, and yet another goes to
- the end of the file. The PROC program also gives errorlevels
- that are processed by the batch file.
-
- Errorlevels and associated batch processing commands permit
- tailoring the batch file and bypassing of unnecessary processing
- steps, saving substantial amounts of time, which, in turn,
- translates into more time for user-access and other processes.
- (There is NEVER too much time.)
-
- What Errorlevels BinkleyTerm Produces
-
- BinkleyTerm returns errorlevels in four general cases:
-
- Sysop-Initiated
- Fx keys, Escape and Alt-X
-
- Sysop-Defined
- E1=, E2= and E3= exits used with event scheduling, and
- external mail program exits
-
- Caller-Initiated
- A non-mail call returns the baud rate code
-
- System-Generated
- BinkleyTerm cannot find itself in the nodelist
-
- What errorlevels (exit codes) does BinkleyTerm return?
-
- Many values are "hard coded" in BinkleyTerm or are provided in
- the sample files included in the distribution package. However,
- only some of the values have "fixed" definitions.
-
-
-
-
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 25
-
- Error-
- Level Means Caused By
- --------- -------------- ----------------------------------
- 1 Exit Alt-X Keypress
- 3 300 bps Call Non-Mail Call at 300 Baud
- 10 E1= Exit ** F1 Keypress *
- 12 1200 bps Call Non-Mail Call at 1200 Baud
- 20 E2= Exit ** F2 Keypress *
- 24 2400 bps Call Non-Mail Call at 2400 Baud
- 30 E3= Exit ** F3 Keypress *
- 40 ** F4 Keypress
- 48 4800 bps Call Non-Mail Call at 4800 Baud
- 50 ** F5 Keypress
- 60 ** F6 Keypress
- 70 ** F7 Keypress
- 80 ** F8 Keypress
- 90 ** F9 Keypress
- 96 9600 bps Call Non-Mail Call at 9600 Baud
- 99 ExtrnMail External Mail String Received *****
- 100 ** F10 Keypress
- 128 38400 bps Call Non-Mail Call at 38,400 Baud ****
- 192 19200 bps Call Non-Mail Call at 19,200 Baud
- 254 Error Address Not Found in Nodelist ***
- 255 Error Microsoft C Produced Error
-
- * As shipped; the sample BINKLEY.EVT event file included in
- the distribution package uses errorlevels 10, 20 and 30 for
- E1=, E2= and E3= exits respectively. Thus pressing F1, F2
- or F3 has the same effect as BinkleyTerm making an E1=, E2=
- or E3= exit. Exits are defined as:
-
- E1= Beginning of Event
- E2= Mail Received
- E3= Compressed Mail Received
-
- ** All F-key exits have user-defined functionality.
-
- *** BinkleyTerm will exit with errorlevel 254 when it cannot
- find its own address in the nodelist. Other conditions
- checked are:
-
- - Non-Zero Zone Number Designated
- - Non-Zero Net Number Designated
- - System Name Designated
- - Sysop Name Designated
- - Outbound (Hold) Area Designated
- - Inbound Area Designated
-
- If any of these parameters are not designated or are
- improperly designated as noted, then an errorlevel 254 exit
- is performed. These parameters are designated in the
- configuration file.
-
- **** Errorlevel values allowed by DOS are from 0 to 255.
-
- BinkleyTerm Version 2.30 - User's Guide - Page 26
-
- Therefore, the value of a 38,400 baud exit "wraps" around to
- equal 128, instead of 384.
-
- ***** The external mail program functionality features
- configurable exit values, but the default value is 99.
-
- Making Errorlevels Work For You
-
- You, the user, define ALL errorlevels associated with the E1=,
- E2= and E3= exits, setting them in BINKLEY.EVT. You 'program' a
- specific task to occur at the beginning of a selected BinkleyTerm
- "event" (time interval) by selecting a unique "E1=" code for that
- task.
-
- The task can be set to occur periodically throughout each day,
- once-per-day, once-a-week or on selected days within the week;
- further, you may execute a given task at different times on
- different days, if so desired, depending on the way a particular
- event is configured. Similarly, by having a variety of E2= and
- E3= codes, you can use different mail unpacking routines
- throughout the day or week. Refer to the section "Scheduling
- Events" in the Reference Guide for details.
-
- You customize the operation of your BBS or Point to meet your
- specific needs and those of your "customers".
-
- Errorlevels, Batch Files and ExtrnMail
-
- This BinkleyTerm option is intended for invocation of an external
- mail handling program, possibly an alternate mailer, upon
- reception of a user-defined string of characters. It can also be
- used to set-up multiple BBS installations, allowing a user to
- specify which BBS he or she wants. This is covered in detail in
- the sections "External Mail Programs" and "User-Selected BBS
- Functionality" elsewhere in this manual.
-
- Errorlevels, Batch Files and Housekeeping
-
- Another common application of exits and exit values is for
- housekeeping. For example, the author set up his Point system to
- do daily housekeeping (deleting and renumbering of the message
- base) daily at 8:00am. Twice a day, at 4:00am and 11:00pm, his
- Point polls his BossNode. Each Saturday, the Point requests the
- current NODEDIFF from the BossNode and, then, on Sunday,
- processes the weekly NODELIST. A distinct E1= errorlevel handles
- each task.
-
- Thus, only you can prevent chaos and create an orderly
- functioning batch file for your BBS or Point. Be vigilant, and
- avoid re-using the same errorlevel for several different tasks.
-
- DOS Shell Keys
-
- There are also 9 programmable DOS shell exits which are invoked
-
- BinkleyTerm Version 2.30 - User's Guide - Page 27
-
- by using Alt-Fx key combinations. You enable and set these up in
- the configuration file. Look for 'Shell' near the end of the
- sample BINKLEY.CFG file included with BinkleyTerm, and refer to
- the section "Configuration File," the command 'Shell' in the
- Reference Guide.
-
- These shells produce NO errorlevels but are mentioned because
- they are an alternate and/or additional solution to creating
- Sysop controllable exit/task options. When configured, these
- shell keys invoke a new copy of the command processor,
- COMMAND.COM. You may not want to use these as they consume extra
- memory for the 2nd copy of COMMAND.COM.
-
- Using Errorlevels
-
- How do you use errorlevels? By testing for their existence with
- the batch file statement:
-
- IF ERRORLEVEL n GOTO xxx
-
- Where:
-
- n is a numeric value
- xxx is a label within the batch file
-
- Bear in mind the following Rules:
-
- The "IF ERRORLEVEL ... " statements must follow immediately
- after the program they test.
-
- "IF ERRORLEVEL n" returns true for any value GREATER THAN or
- EQUAL TO "n", therefore,
-
- Test errorlevels in descending numerical sequence, and,
-
- Trap unwanted exit codes so that a step will be executed if,
- and only if, the desired errorlevel is encountered.
-
- In this excerpt from a batch file, the "Start_BT" label refers to
- a section that loads BinkleyTerm:
-
- IF ERRORLEVEL 21 GOTO Start_BT <- Traps 21 to etc. *
- IF ERRORLEVEL 20 GOTO OpenMail <- Branch & Open Mail
- IF ERRORLEVEL 11 GOTO Start_BT <- Traps 11 to 19 *
- IF ERRORLEVEL 10 GOTO Start_BT <- "Non-Event"
- IF ERRORLEVEL 3 GOTO Start_BT <- Traps 3 to 9 *
- IF ERRORLEVEL 2 GOTO Bad_Exit <- Nodelist Entry Error
- IF ERRORLEVEL 1 GOTO Exit_BT <- Branch to 'Exit'
-
- * Invalid responses are 'trapped', BinkleyTerm restarts.
-
- What Now?
-
- Look at some "good" examples which demonstrate automating
-
- BinkleyTerm Version 2.30 - User's Guide - Page 28
-
- processes using batch files and errorlevels. In particular, look
- at the samples provided by Bob Hartman and Alan Applegate for
- BinkleyTerm (available from 1:104/36), or samples that existing
- BinkleyTerm Sysops may be able to provide you. Then, make up
- your own batch file to control a process. Or, take one of the
- samples and modify it for your specific needs. Have fun! Hack
- away!
-
- Consult the documentation for each of your application programs,
- determine whether or not it produces errorlevels, and how you can
- take advantage of them.
-
- Errorlevel and Batch File Hints and Kinks
-
- When looking at sample batch files, note carefully how each
- author organized the program logic in his batch file. Here are
- some reminders.
-
- A batch file loses 'control' if it merely invokes another batch
- file (e.g. you execute a second batch file within the first);
- instead, "shell out" to DOS from the first batch file by invoking
- another copy of COMMAND.COM. Using the /C switch closes that
- second command processor when the second batch file finishes.
- Consult your DOS reference materials for more information on this
- point.
-
- Examples:
-
- COMMAND.COM /C Pak_Mail.BAT
-
- or:
-
- %comspec% /C Pak_Mail.BAT
-
- This is true for all MS-DOS versions up to and including 3.2.
- MS-DOS/PC-DOS 3.3 introduced the batch command CALL which
- overcomes this limitation, when it is used. Refer to your DOS
- manual.
-
- Sometimes, your batch file must "remember" what it is doing. You
- can accomplish this by "setting" an environment variable, for
- example:
-
- SET PROC=UNATTENDED
-
- Your batch file can then determine its "logic path" or invoke
- other programs using statements such as:
-
- IF %PROC% == UNATTENDED GOTO xxx
-
- or:
-
- IF %PROC% == UNATTENDED BT UNATTENDED
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 29
-
- or:
-
- IF %PROC% == UNATTENDED %comspec% /C Pak_Mail.BAT
-
- In the above examples, the program follows a certain logic path
- and performs specific tasks when it's in the unattended mode.
-
- Verify that you have sufficient environment space for any
- variables which you want to "store" in it. Review the section
- concerning the SHELL entry for CONFIG.SYS in your DOS reference
- material. This will explain how to enlarge the environment space
- if that is needed. The exact adjustments which you may need to
- make are dependent upon your version of MS-DOS/PC-DOS, and
- several other factors such as memory use, size of DOS paths and
- so on.
-
- You can also pass a variable into a batch file when you invoke a
- program. For example, the author's POINT.BAT batch file
- immediately comes up in the Unattended Mode if you invoke it
- with:
-
- POINT -u (or, POINT -U)
-
- POINT.BAT then leapfrogs directly into unattended mode using the
- following statements:
-
- IF %1 == -u SET PROC=UNATTENDED
- IF %1 == -u GOTO Start_BT
- ...
-
- :Start_BT
- IF %PROC% == TERM BT <-Terminal Mode
- IF NOT %PROC% == TERM BT %PROC% <-Other Modes
-
- Finally, use of errorlevels is not always necessary. Some
- programs provide an alternative which may meet your needs.
-
- For example, ConfMail and some editors produce an ".OUT" file
- containing the name of each EchoMail area for which mail has been
- received or created. Thus, test for the existence of the .OUT
- file rather than testing the errorlevels and, thereby, simplify
- the logical branching in your batch (.BAT) file. For example:
-
- if exist AREAS.OUT ConfMail Export ... -F AREAS.OUT
- if exist AREAS.OUT del AREAS.OUT
-
- or:
-
- if exist ECHO.OUT ConfMail Maint ... -F ECHO.OUT
- if exist ECHO.OUT ReplyLnk -F ECHO.OUT
- if exist ECHO.OUT del ECHO.OUT
-
- The point here is that such an .OUT file can be used by several
- programs serially, as in the last example, and thus, avoid using
-
- BinkleyTerm Version 2.30 - User's Guide - Page 30
-
- errorlevel driven logic. Further, it can continue working for
- you after you have "lost" your errorlevel by running another
- program.
-
- Environment Variable
-
- In environments where multiple drives and paths are used, it is
- generally a good idea to set a DOS environment variable named
- BINKLEY. BinkleyTerm can then use this variable to determine
- where its configuration file is located, should it not be located
- in the current directory.
-
- Place in your AUTOEXEC.BAT file (or in the batch file that starts
- BinkleyTerm) the line:
-
- SET BINKLEY=C:\PATH
-
- Where C:\PATH is the drive designator and complete path name
- where the configuration file is located.
-
- CONFIGURATION FILE
-
- Most BinkleyTerm parameters are set through a configuration file.
- By default, the configuration file is named BINKLEY.CFG, and is
- expected to be available unless a different configuration file is
- specified on the command line.
-
- A sample BINKLEY.CFG files is included with the distribution
- package. You can edit the file with any plain text editor, such
- as DOS' own EDLIN. The Reference Guide contains a complete
- listing of all BinkleyTerm configuration statements and their
- proper use.
-
- BinkleyTerm directly uses the raw configuration file, and each
- time the program in invoked, BinkleyTerm will scan and process
- the file, setting internal values to those that you have
- selected.
-
- When you first install BinkleyTerm, or if you change your address
- ('Address'), inbound files area ('NetFiles'), outbound files area
- ('Hold'), or NetMail message area ('NetMail') as specified in the
- configuration file, you must run a special program included with
- the distribution package called "BTCTL".
-
- BTCTL
-
- BTCTL is used to create two files based on information in the
- BinkleyTerm configuration file. First, it produces MAIL.SYS, a
- Fido-compatible system file used by many mail processing
- programs. Second, it produces BINKLEY.PRM, a file used by oMMM,
- a mail packer nearly always used with BinkleyTerm.
-
- Note! BTCTL needs to be run only under the circumstances
- mentioned above. BTCTL DOES NOT need to be run for minor changes
-
- BinkleyTerm Version 2.30 - User's Guide - Page 31
-
- to the file that DO NOT include address, inbound file path,
- outbound file path or NetMail message path.
-
- NODELIST
-
- The listing of FidoNet compatible systems in your network is
- called a 'nodelist.' Once a current nodelist is obtained, it can
- be kept up-to-date by using so-called NODEDIFF files that are
- distributed weekly within the network.
-
- The nodelist and update files are distributed in 'raw' form.
- Adjunct software must be used to process and compile the raw
- nodelist and NODEDIFF files into a form usable by BinkleyTerm.
- From now on, when we refer to "nodelist" we're referring to the
- compiled, ready-to-use nodelist data files, not the raw nodelist
- file as distributed within the network.
-
- BinkleyTerm is capable of using a variety of compiled nodelist
- formats. If you do not already have a BinkleyTerm-compatible
- format that you desire to use, the primary formats supported by
- BinkleyTerm are the Opus 'Version 5' nodelist, used by Opus-CBCS
- 1.03b and below, and the Opus 'Version 6' nodelist, used by Opus
- 1.10 and above.
-
- THE VERSION 5 NODELIST SHOULD BE CONSIDERED OBSOLETE. THE
- VERSION 6 FORMAT OR THE QUICKBBS FORMAT (DISCUSSED LATER) ARE THE
- PREFERRED FORMATS FOR BINKLEYTERM, AS SEVERAL IMPORTANT FEATURES
- ARE UNAVAILABLE WITHOUT THEM.
-
- Point installations do not need a nodelist at all if they don't
- care to have one, simply by using all of the following
- configuration file statements:
-
- - BossPhone
- - BossPwd
- - PrivateNet
- - Address
-
- Of course, this requires establishing a session password with
- your boss (as designated by the 'BossPwd' statement). With this
- method, Terminal Mode must be used to poll the boss using the
- Alt-Y keystroke, as Unattended Mode will not operate without a
- nodelist available. Refer to appropriate sections of the manual
- for additional information.
-
- FIDOUSER.LST
-
- The nodelist processing software is also used to produce
- FIDOUSER.LST, a list of Sysop names and node address that
- BinkleyTerm can use when dialing out. When this file is
- available to BinkleyTerm, you can enter a Sysop name in place of
- a node address whenever prompted to enter a node address. This
- applies to both Unattended and Terminal Modes, while polling or
- dialing a system.
-
- BinkleyTerm Version 2.30 - User's Guide - Page 32
-
-
- FIDOUSER.LST should be kept in the same sub-directory as the
- compiled nodelist files are kept.
-
- Version 5 Nodelist
-
- Although this nodelist format is the BinkleyTerm default (for
- backward compatibility), it is considered obsolete for use with
- the current version of BinkleyTerm.
-
- If you are running a Fido 11w or Opus 1.0x system, BinkleyTerm
- can support this nodelist format, but it is highly recommended
- that you produce both a Version 5 and a Version 6 nodelist for
- your system; the former for your BBS software, and the latter for
- use by BinkleyTerm. Again, the Version 5 nodelist is considered
- obsolete, and should not be used unless absolutely necessary.
-
- Version 6 Nodelist
-
- Using the Version 6 nodelist allows BinkleyTerm to have more
- information at its fingertips, specifically, whether a given node
- in the nodelist supports 'Continuous Mail.' Some nodelist
- processors are also able to put modem type information into a
- compiled Version 6 nodelist. The extended information in a
- Version 6 nodelist allows for automatic determination of this
- information, resulting in fewer errors that result from attempts
- to manually compensate for such variables.
-
- The Version 6 nodelist is a relatively new format. Nodelist
- processor commands mentioned in this section apply only to
- ParseLst, a commonly available nodelist processing package. You
- will be able to locate ParseLst from systems that normally carry
- Opus or BinkleyTerm. Other nodelist processors may also support
- this format, and their specific commands may vary.
-
- Make certain that you also make the necessary changes to your
- configuration file. Add the 'NewNodelist' statement, and change
- your event schedules to be compatible as well. Refer to the
- Reference Guide for additional information.
-
- Please note that the index files for the Version 5 and Version 6
- nodelists ARE IDENTICAL. Therefore, you may use BOTH lists
- SIMULTANEOUSLY. This is helpful in installations where Opus-CBCS
- 1.0x or Fido 11w is used under BinkleyTerm.
-
- With ParseLst, you'll need to use the following statements in the
- ParseLst configuration file in order to process a nodelist for
- BinkleyTerm's use: UseZone, Complete, and Version6. Don't
- forget to use 'NewNodelist' in BinkleyTerm's configuration file.
-
- QuickBBS Nodelist
-
- BinkleyTerm also supports the QuickBBS Version 2.0x nodelist.
- This nodelist format is equivalent in functionality to the
-
- BinkleyTerm Version 2.30 - User's Guide - Page 33
-
- Version 6 nodelist described above, including automatic
- determination of whether a node can accept Continuous Mail.
-
- In order for the QuickBBS nodelist to be used with BinkleyTerm,
- it MUST be processed by ParseLst Version 1.01 or higher. At this
- writing, Qnode, the nodelist processor included with QuickBBS,
- does not support the extended information BinkleyTerm requires
- from the nodelist. ParseLst will insure that the information is
- included, as well as provide complete compatibility with
- QuickBBS. Other nodelist processors, such as XlaxNode, should
- also be able to produce a QuickBBS nodelist that contains the
- necessary information for BinkleyTerm to function properly.
-
- To use this format, add the statement 'QuickNodelist' to your
- configuration file. Refer to the Reference Guide for additional
- information.
-
- TBBS Nodelist
-
- BinkleyTerm can use the nodelist format supported by TBBS. In
- order to obtain additional information about the various nodes in
- the list, BinkleyTerm requires an adjunct file, NODELIST.EXT.
-
- The nodelist is first processed normally for TBBS. Then,
- ParseLst is used to produce NODELIST.EXT and NODELIST.IDX from
- the raw nodelist. These files are then used together by
- BinkleyTerm to provide full functionality as described above for
- the Version 6 nodelist. This includes automatic determination of
- whether a node can accept Continuous Mail.
-
- PLEASE NOTE! The TBBS format DOES NOT provide sufficient
- information to allow BinkleyTerm's zone support to be active. If
- you use this format, YOU MUST ALSO USE the 'NoZones' statement in
- your configuration file. Refer to the section "Zone Support" for
- additional information.
-
- To use this format, add the statement 'TBBSNodelist' to your
- configuration file. Refer to the Reference Guide for additional
- information. Also refer to the ParseLst documentation for more
- information about compiling NODELIST.EXT.
-
- Nodelist Support Information
-
- The authors of BinkleyTerm are willing to consider supporting
- additional nodelist formats. To facilitate the support of your
- nodelist format, the following information is required:
-
- 1. C language structure definition for the format. (Pascal
- is acceptable too, but C is preferred.)
-
- 2. Definitions of any of the fields in the format. In
- particular, bit fields must be defined, and the contents of
- any field that is not obvious must be given.
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 34
-
- 3. Compiler and instructions for generating the given
- nodelist format.
-
- 4. Examples of C code to look-up a given
- zone:net/node.point number in the nodelist. (Note that any
- code used will be given out for free in source form, so this
- should not be taken lightly.)
-
- 5. A phone number and hours when the author can be reached
- if there are issues that need to be resolved.
-
- 6. IMPORTANT! A good reason why we should include the
- format.
-
- 7. IMPORTANT! If this is for BinkleyTerm front-ending for
- a certain type of BBS, the author should include
- configuration files, batch files, etc. that will be
- necessary for others to use BinkleyTerm and his BBS. This
- will save us a lot of work tracking these things down in the
- long run.
-
- If all of this information is forwarded to 1:132/101, 1:141/491
- or 1:104/36 we can get back to the author within a week or two to
- tell them whether the format will be in the next release.
-
- ZONE SUPPORT
-
- Zones are a high-level addressing scheme devised for use within
- FidoNet. In a full FidoNet address, such a 1:104/36.0, '1' would
- be the zone, '104' the net, '36' the node number, and '0' the
- point number. Currently, zone addressing is not supported within
- the FidoNet message or packet structure, allowing software such
- as BinkleyTerm to provide only "kludged" support of zones.
- BinkleyTerm offers such support, and endeavors to make it as
- seamless as possible.
-
- If for some reason you do not wish zone support to be active,
- place the statement 'NoZones' in your configuration file. This
- will cause BinkleyTerm to essentially "turn off" zone support.
- If you intend not to use zone support, then use the 'NoZones'
- configuration file statement.
-
- If you have not used the 'NoZones' statement, BinkleyTerm will
- assume that a full, zone-based nodelist is available for its use.
- For information on how to properly compile a nodelist for
- BinkleyTerm, refer to the section "Nodelist" for more
- information.
-
- When attempting to send mail to nodes in other zones, BinkleyTerm
- will assume that mail for other zones will be held in separate
- outbound areas by zone number. For example, if your outbound
- mail directory is C:\BT\OUTBOUND, mail for your zone will be held
- there. However, mail for nodes in zone 2 would be expected in
- C:\BT\OUTBOUND.002, mail for zone 3 would be expected in
-
- BinkleyTerm Version 2.30 - User's Guide - Page 35
-
- C:\BT\OUTBOUND.003, and so on. This example is for zone 1.
-
- The zone number for which your default outbound directory applies
- is determined by the FIRST appearance of the 'Address' statement
- in your configuration file. Subsequent 'Address' statements
- identify your alternate identities within other zones (and/or
- networks). For example, if the first 'Address' statement
- designates an address in zone 2, then the outbound area
- designated by the 'Hold' statement in your configuration file is
- the default, and mail to other zones would require their own
- distinct outbound areas with extensions that match the zone
- number.
-
- The multi-zone outbound areas are in hexadecimal. For example,
- the outbound area for zone 10 would be C:\BT\OUTBOUND\.00A.
- Using this method, it is possible to support up to 4,095 zones.
-
- Your mail packer also needs to support the discrete outbound
- areas for multiple zones. oMMM versions greater than 1.30
- support them, as well as the MOOO package. oMMM is commonly
- available wherever BinkleyTerm or Opus-CBCS files are available.
- MOOO is also available from many such locations.
-
- MULTIPLE NETWORK OPERATION
-
- Operation of a system within multiple networks is becoming
- increasingly popular. Normally, networks such as AlterNet,
- EggNet, RBBS-Net and so on are implemented as separate zones. To
- facilitate operation of a BinkleyTerm system within multiple
- networks, you may specify a separate system address, each with a
- different zone.
-
- For example, if you wish to use a different address for FidoNet
- (currently zones 1, 2, 3 and 4) and for two alternative networks,
- you might have the following in your configuration file:
-
- Address 1:1010/89.0
- Address 9:569/999.0
- Address 11:334/1.0
-
- If your system connects with a system in zone 9, your system will
- identify itself as 9:569/999. If connected with a zone 11
- system, it will identify itself as 11:334/1. The first 'Address'
- statement is the default, and callers in zone 1 (and any zones
- other than 1, 9 and 11 - those specified with 'Address'
- statements) would find your system identified as 1:1010/89.
-
- SECURITY
-
- In the ideal world, we would not need locks, police, or jails;
- there wouldn't be crime. But we don't live in an ideal world,
- and for this reason, BinkleyTerm offers a selection of features
- that are intended to offer your system a certain level of
- security against "electronic mail crime."
-
- BinkleyTerm Version 2.30 - User's Guide - Page 36
-
-
- The existence of security features is not intended to evoke fear.
- Chances are excellent that you will have no need for security
- features in most cases. But just as high crime areas see more
- locks and iron gates than low-crime areas, the choice of how much
- security to put in place is up to you, and is based on your needs
- and experience.
-
- BinkleyTerm's internal security is based on a simple principle.
- With the exception of session passwording, for each secured
- feature (all of which are specified within the configuration
- file), there is a default statement. When you implement no
- security features, the default statement is used to specify a
- particular feature's configuration.
-
- Prot
-
- When security is implemented, however, two more statements are
- used in addition to the default. One type of statement, known as
- "Prot" for "protected," describes a group of systems with which
- you have implemented session passwording. These links are
- "protected" by passwords.
-
- When session passwording is implemented, unless a password is
- matched when connecting to a protected system, a mail session is
- aborted.
-
- "Protected" or "Prot" systems are the top-level, or "most
- favored" situations, since you generally know the other person at
- the other end (a pre-requisite to establishing a password).
-
- Known
-
- The second type of statement is called "Known" and describes
- systems that are listed in the nodelist ("known" to you) but with
- whom you have not established a session password. These are
- links with listed systems, but links that are not password
- protected. This group represents the middle-level of security.
-
- Default
-
- When you use a Prot and/or a Known security feature, then the
- default statements all take on a new meaning - that of unknown
- systems. The defaults are used for links that are not in the
- nodelist, and therefore, cannot have a session password
- established. This group of systems represents the lowest-level
- of security, since you really have no idea who owns such systems,
- or where they are located.
-
- Security - Session Passwording
-
- BinkleyTerm supports session-level password protection. Using
- such protection helps prevent situations where someone uses a
- FidoNet mailer to 'impersonate' a legitimate FidoNet node, and
-
- BinkleyTerm Version 2.30 - User's Guide - Page 37
-
- pickup mail addressed to the node. When implemented, both the
- sending and receiving systems must have it in operation, with the
- same password on both ends (exceptions noted below).
-
- With Point systems, passwording can be automatic. Simply use the
- 'BossPwd' configuration file option, and choose a password. Make
- sure your Boss also uses the same password.
-
- For other types of systems, password information is kept in the
- nodelist data file. ParseLst (and some other nodelist
- processors) can easily add a password to a nodelist entry during
- processing. Refer to the documentation for your nodelist
- processor.
-
- When talking with other BinkleyTerm, Opus or compatible systems
- that use the YooHoo session negotiation method, full, two-way
- protection is available. The systems connect and exchange the
- password when the YooHoo takes place. If the passwords do not
- match, the session is terminated, regardless of who initiated the
- call. The only exception is when you have a password
- implemented, but the remote has NO password implemented. In this
- case, if YOU placed the call, then a session will still occur.
- If the REMOTE placed the call, then the session will be aborted.
-
- When connected with SEAdog and compatible systems, password
- matching takes place only when you are picking up mail from the
- remote system. You may send to a SEAdog system without a
- password match taking place. (The assumption is that you always
- know who you're calling, but don't always know who's calling
- you.)
-
- Note that session passwords must not exceed eight (8) characters,
- and are case insensitive.
-
- When BinkleyTerm cannot find a password for a remote system when
- placing a call, it will not check for a password during the
- session. This responsibility is left to the remote system, if
- the remote chooses to perform checking.
-
- BinkleyTerm allows easy implementation of new passwords. Simply
- add the agreed upon password as outlined above, and send the
- remote system a message. BinkleyTerm will allow an outbound
- session to take place in cases where you have designated a
- password, but the remote has not yet implemented it. This is
- handy for letting a remote system know that a password was
- implemented. Note that in this case, BinkleyTerm will NOT allow
- the remote to have a successful session when the remote calls
- your system; only when you place the call (as stated above, the
- idea is that you know who you're calling, not who's calling you).
-
- Security - Secured Inbound File Areas
-
- Another method of securing the flow of mail involves controlling
- the processing of incoming mail to your system. In most cases,
-
- BinkleyTerm Version 2.30 - User's Guide - Page 38
-
- you will want to protect common mail links with session
- passwording, as outlined in the previous section. Still, the
- potential exists for another abusive system to send you rogue
- mail, or mail "planted" onto your system in hopes that it will be
- routed to another system at your expense, or find its way into a
- national EchoMail conference.
-
- The following list shows the various security levels and the
- configuration file statements that define their respective
- inbound paths:
-
- Prot 'ProtInbound'
-
- Known 'KnownInbound'
-
- Default 'NetFile'
-
- In a typical installation secured in this manner, mail will
- automatically be processed only if received to the 'ProtInbound'
- area. Mail received to 'KnownInbound' or 'NetFile' must be
- examined and processed manually. Of course, you could choose to
- configure your system in a such a manner that mail received in
- any of the three areas is processed automatically to your liking,
- possibly to special message areas.
-
- The only "hole" in this is with FSC-0001 sessions, such as those
- with SEAdog or Fido. Since BinkleyTerm has no way of knowing the
- address of the sending system until a packet is received, that
- first packet (.PKT file) will always be placed in the default
- area specified by the 'NetFile' statement.
-
- Secured inbound file areas simply provide another, extra measure
- of handling potential security problems associated with the
- reception of "rogue" or "planted" mail.
-
- Security - Controlling File Requests
-
- BinkleyTerm offers a method of establishing limitations on file
- requests received from systems that are not session password
- protected, or are not found in the nodelist. This support is
- optional; if you do not wish to limit file requests in this
- manner, use only the files and configuration file statements
- mentioned in the section "File Requests."
-
- The following table lists these possibilities, the file types (as
- described in the section "File Requests") and the respective
- configuration file statement used:
-
- Prot ABOUT 'ProtAbout'
- AVAIL 'ProtAvail'
- OKFILE 'ProtReqList'
- Maximum 'ProtReqLim'
-
- Known ABOUT 'KnownAbout'
-
- BinkleyTerm Version 2.30 - User's Guide - Page 39
-
- AVAIL 'KnownAvail'
- OKFILE 'KnownReqList'
- Maximum 'KnownReqLim'
-
- Default ABOUT 'About'
- AVAIL 'Avail'
- OKFILE 'Okfile'
- Maximum 'MaxReq'
-
- Essentially, the default files and configuration file statements
- described in the section "File Requests" are used for all file
- requests by default unless a higher "Known" or "Prot" statement
- is used.
-
- Note that all file request controls apply to update requests and
- function requests as well.
-
- Security - Response File Templates
-
- Refer to the section "Request Response Files" for information on
- their operation and use.
-
- It is possible to designate separate response file templates for
- each of the three security levels. Generally, you won't want or
- need to do this unless security controls on file requests have
- been implemented.
-
- The security levels and their respective configuration files
- statements for secured response file templates are:
-
- Prot 'ProtReqTpl'
-
- Known 'KnownReqTpl'
-
- Default 'ReqTemplate'
-
- BBS INTERFACE
-
- One of the most common uses of BinkleyTerm is as a mail front-end
- for a bulletin board system, or BBS. BinkleyTerm offers three
- different methods for passing control to a BBS. The method you
- use is determined by a configuration file statement (refer to the
- Reference Guide for details).
-
- BBS Exit
-
- The 'BBS Exit' option will cause BinkleyTerm to exit to the
- start-up batch file with an errorlevel of the baud rate divided
- by 100 upon receipt of a non-mail call. For example, a 300 baud
- caller exits to the batch file with an errorlevel of 3, a 2400
- baud caller at errorlevel 24.
-
- The batch file then detects the errorlevel, and jumps to a
- section of the batch file you designate to start the BBS program
-
- BinkleyTerm Version 2.30 - User's Guide - Page 40
-
- with the required information. The batch file should recycle and
- restart BinkleyTerm once BBS use is terminated.
-
- BBS Spawn
-
- The 'BBS Spawn' option causes BinkleyTerm to stay resident when a
- caller accesses the BBS. BinkleyTerm will execute the following
- command as a child process:
-
- spawnbbs <baud> <port> <time> <modem_info>
-
- SPAWNBBS.BAT is the name of a batch file you create. <baud> is
- the baud rate of the connection, <port> is the communications
- port number used for the call, and <time> is the number of
- minutes to the next non-BBS-allowed event (as designated in your
- configuration file event schedules). <modem_info> is intended
- primarily for RBBS-PC installations where extended modem connect
- information may be desired. For example, USRobotics HST modems
- might issue the connect message "CONNECT 9600/ARQ" in which case
- the <modem_info> parameter would be "/Arq" indicating a
- "reliable" connection. Note that in this parameter, only the
- first letter of each "word" will be capitalized (as shown in the
- example).
-
- The batch file can use the parameters passed to it with standard
- DOS conventions. %1 designates the first parameter (baud rate in
- this case), %2 the second parameter (port number), and so on.
- Opus might be started from SPAWNBBS.BAT with this command line:
-
- opus bbs -b%1 -p%2 -t%3
-
- Refer to the documentation for your particular BBS for the
- command line information that can be passed to the BBS.
-
- The primary disadvantage of the 'BBS Spawn' option is that
- BinkleyTerm stays memory resident while the BBS operates. This
- could cause memory availability problems on some systems. Be
- certain to check the memory requirements of your BBS software.
-
- If you choose to use the 'SwapDir' configuration file option, the
- 'BBS Spawn' option will be workable. Using 'SwapDir' causes
- BinkleyTerm to leave only a small kernel of itself in memory when
- performing DOS shells, making available substantially more memory
- than would otherwise be available. Refer to the Reference Guide
- section "Configuration File" for additional information.
-
- BBS Batch
-
- The 'BBS Batch' option uses the best of both of 'BBS Exit' and
- 'BBS Spawn.'
-
- BinkleyTerm still exits to the start-up batch file, but prior to
- exiting, BinkleyTerm physically writes to the disk a batch file
- named BBSBATCH.BAT, which contains a single line. An example of
-
- BinkleyTerm Version 2.30 - User's Guide - Page 41
-
- the contents of this file might be:
-
- spawnbbs 2400 1 47 /Arq
-
- The information is the baud rate, port number and time in minutes
- to the next non-BBS event. In this case, there is a 2400 baud
- caller, on COM port 1, with 47 minutes remaining to the next non-
- BBS event, and a modem information string of /Arq.
-
- After writing this file, BinkleyTerm exits as does the 'BBS Exit'
- option, with an errorlevel of the baud rate of the caller divided
- by 100.
-
- The start-up batch file should simply start execution of
- BBSBATCH.BAT by adding the line "bbsbatch" to the file, and
- jumping to the line whenever a human caller is on-line. In other
- words, regardless of the baud rate of the caller, BBSBATCH.BAT
- should be invoked.
-
- Once invoked, BBSBATCH.BAT will invoke SPAWNBBS.BAT with the
- necessary parameters that include the baud rate, port number, and
- minute to the next non-BBS event. SPAWNBBS.BAT would physically
- invoke the BBS with the proper command lines. When use of the
- BBS is complete, this batch file should re-invoke the BinkleyTerm
- start-up batch file.
-
- Using this 'BBS Batch' method of accessing the BBS, BinkleyTerm
- can still provide all the information of the 'BBS Spawn' method,
- without the necessity of staying resident.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 42
-
- BBS Batch Method Flowchart
-
- The 'BBS Batch' method of accessing BBS software is confusing to
- many BinkleyTerm users.
-
- For further clarification, a flowchart of this method is shown
- here:
-
- +-----------------------+
- | Wait for Call | <-------------+
- +-----------------------+ |
- | |
- v |
- No +-----------------------+ |
- Mail <------| Human Caller? | |
- +-----------------------+ |
- Yes | |
- v |
- 300 +-----------------------+ 1200 |
- +------| Baud Rate |------+ |
- | +-----------------------+ | |
- | 2400 | | 9600 | |
- +--------+ | | +--------+ |
- | | | | |
- v v v v |
- +-----------------------+ |
- | Invoke BBSBATCH.BAT | |
- +-----------------------+ |
- | |
- v |
- +-----------------------+ |
- | Invoke SPAWNBBS.BAT | |
- | w/ Parameters | |
- +-----------------------+ |
- | |
- v |
- +-----------------------+ |
- | Invoke BBS System | |
- | w/ Parameters | |
- +-----------------------+ |
- | |
- +---------------------------+
-
- Banner
-
- When a file named BINKLEY.BAN is present in the directory that
- BinkleyTerm is invoked from, the file will be displayed to
- callers immediately after the BinkleyTerm identification line.
-
- The file is a flat ASCII text file, and may contain extended
- information for the benefit of callers.
-
-
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 43
-
- EXTERNAL MAIL PROGRAMS
-
- BinkleyTerm can be used with external mail programs, such as
- UUCP.
- When an 'ExtrnMail' statement is used in the configuration file,
- BinkleyTerm will answer the phone and wait for a YooHoo or TSYNC
- (the start of a mail session) or a string you designate with the
- 'ExtrnMail' option. When the designated string is received from
- the remote system, BinkleyTerm will send the string associated
- with the 'MailNote' configuration file option (if any), then will
- physically write a batch file called MAILBAT.BAT to the disk, and
- exit the start-up batch file with an errorlevel as given with the
- 'ExtrnMail' statement, or with errorlevel 99 if none was given.
-
- MAILBAT.BAT contains a single line:
-
- EXTMAIL <baud> <port> <time> <errorlevel> <modem_info>
-
- Where <baud> is the baud rate of the caller, <port> is the COM
- port number, and <time> is the time in seconds to the next non-
- BBS event, <errorlevel> is the errorlevel number used to exit the
- original batch file, and <modem_info> is extended modem connect
- information.
-
- <errorlevel> will be the same as that given with the 'ExtrnMail'
- statement in the configuration file, or "99" if none was given.
-
- <modem_info> is intended primarily for RBBS-PC installations
- where extended modem connect information may be desired. For
- example, USRobotics HST modems might issue the connect message
- "CONNECT 9600/ARQ" in which case the <modem_info> parameter would
- be "/Arq" indicating a "reliable" connection. Note that in this
- parameter, only the first letter of each "word" will be
- capitalized (as shown in the example).
-
- Notice the similarity in concept between this and the 'BBS Batch'
- method of invoking a BBS (as described previously). When
- BinkleyTerm exits with the previously defined errorlevel, your
- batch file must capture the errorlevel and invoke MAILBAT.BAT,
- which will in turn invoke EXTMAIL.BAT with the various command
- line parameters shown above.
-
- EXTMAIL.BAT is then used to invoke the external mail program of
- your choice, taking the needed command line parameters as
- supplied by the batch file, and processing and/or using them as
- needed. Once the external mail program session has been
- completed, your original start-up batch file for BinkleyTerm
- should be invoked to place BinkleyTerm on-line again.
-
- USER-SELECTED BBS FUNCTIONALITY
-
- An additional use for the external mail functionality described
- in the previous section would be to allow multiple BBS systems to
- reside at the same telephone number, and to give BBS users the
-
- BinkleyTerm Version 2.30 - User's Guide - Page 44
-
- ability to select the desired BBS from a menu. It would be
- possible to run completely separate systems, to run the same
- system with different BBS packages, and so on. This section will
- give an overview of the procedure.
-
- Basically, 'ExtrnMail' statements in the configuration file are
- used to build the menu options themselves. If you want to exit
- to the batch file when a user presses 'A' on their terminal, then
- a configuration file entry like this would be needed:
-
- ExtrnMail 130 A
-
- This would cause BinkleyTerm to write MAILBAT.BAT to the disk,
- and exit to the batch file with an errorlevel of 130. As
- described in the previous section on external mail programs, your
- batch file should invoke MAILBAT.BAT, which in turn invokes
- EXTMAIL.BAT. EXTMAIL.BAT would be the batch file that acts upon
- the choice, and physically invokes the desired BBS program.
-
- If you want the choices to be case-insensitive, then two
- 'ExtrnMail' statements would be needed for each letter, like
- this:
-
- ExtrnMail 130 A
- ExtrnMail 130 a
-
- This would cause BinkleyTerm to use errorlevel 130 when either
- 'a' or 'A' is received from the user.
-
- The menu presented to users should be kept in a file called
- BINKLEY.BAN (refer to the "Banner" section for more information).
- This file might look like this:
-
- Welcome to Multi-System 100. Please choose the desired BBS:
-
- A - "Garden Central" Using QuickBBS Software
- B - "Margarita Bay" Using Opus-CBCS Software
- C - "Margarita Bay" Using Fido 11w Software
-
- Make your selection by letter...
-
- Such a menu would allow users three options. Each lettered
- option would require a separate 'ExtrnMail' statement in the
- configuration file; two each if case insensitivity is required.
-
- The string "Make your selection by letter..." is NOT contained in
- BINKLEY.BAN, but rather, is added with a 'Banner' statement in
- the configuration file so that the line is re-displayed each time
- a user makes an incorrect choice (refer to the Reference Guide
- section "Configuration File" for information).
-
- Once the user has made a selection, and MAILBAT.BAT is invoked
- and in turn EXTMAIL.BAT is invoked, then the batch file must
- determine which selection is made and act upon it.
-
- BinkleyTerm Version 2.30 - User's Guide - Page 45
-
-
- In EXTMAIL.BAT (where the BBS systems are invoked), the top of
- the batch file should make a determination as to which choice was
- given by the user. One of the parameters on the command line
- when EXTMAIL.BAT is invoked by MAILBAT.BAT is the errorlevel
- which corresponds to the choice the user gave (as designated by
- an 'ExtrnMail' statement in the configuration file).
-
- A section of the batch file might look like this:
-
- if %4 == 130 goto bbs1
- if %4 == 140 goto bbs2
- if %4 == 150 goto bbs3
-
- The fourth parameter given on the command line is the errorlevel
- value, and is reference by "%4" as shown. For example, if the
- errorlevel that corresponds to the choice was 130, then batch
- file execution would jump to the "bbs1" label, and invoke a
- particular BBS program.
-
- Please note that the default is for a user to press the "escape"
- key to enter the BBS. One of the BBS systems should be setup as
- the default system as described in the section "BBS Interface."
- Should a user press "escape," or if the time limit to make a
- response should expire, the default BBS would be invoked.
-
- Note also that the configuration file parameter 'Timeout' should
- be extended to allow a user more time to read and make a
- selection prior to making a default exit. A 'Timeout' value of
- 30 to 60 seconds is suggested.
-
- Placing multiple BBS systems on-line at one number takes some
- work and experimentation in order to operate correctly.
- Hopefully the tips given here will point you in the right
- direction.
-
- FILE REQUESTS
-
- BinkleyTerm supports the two popular file request methods
- currently in use in FidoNet; "Bark" requests as designed for and
- used by SEAdog, and "WaZOO" as designed for and used by Opus-
- CBCS. Either style can be used on an incoming or outgoing basis.
-
- To generate an outgoing file request, use one of the many
- utilities designed for the purpose, such as AMAX, Please, oGet,
- tGet, etc. Any Opus-compatible file request builder can be used
- with BinkleyTerm. You may also manually build file requests.
- They are a single-line flat ASCII text file, and are named in the
- same manner as packets (refer to the section "How BinkleyTerm
- Handles Mail" for information on the naming convention) and have
- a file extension of .REQ. Outgoing requests NEVER should have a
- drive and path designation; only the file name. The remote
- system handles the drives and paths.
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 46
-
- The .REQ file is placed in your outbound holding area.
- BinkleyTerm will handle .REQ files in the same manner as it does
- Normal packets (unless an 'X' flag is applied to an event), but
- you can also manually poll to send the request immediately.
-
- Incoming requests are controlled and affected by four files, each
- of which are designated in the configuration file.
-
- The first file, OKFILE, is a machine-read listing of files,
- complete with drive and path, that you will allow to be sent to
- remote systems via file request. The file is designated with the
- 'Okfile' statement in the configuration file. Wildcards are
- allowed, and nearly always used. When an incoming request is
- received, the request is checked against the OKFILE to see if you
- permit the file to be sent.
-
- The OKFILE also allows you to implement "magic filenames" which
- are words used to represent a file. If someone requests
- "BINKLEY" from you, for example, you could set-up your OKFILE in
- such a way as to send BEXE_150.ARC in return. This frees the
- person making the request from having to know the exact filename
- of the file he wants. This is generally used by systems which
- are software distribution points, hubs, and so on.
-
- Password protection may also be implemented with the OKFILE,
- making a password required in order to receive a particular file
- or group of files.
-
- A sample OKFILE:
-
- b:\aprog.ARC
- c:\file\stuff\*.*
- c:\file\programs\wlc*.txt
- c:\file\private\*.* !mypass
- @BINKLEY c:\file\dist\bexe_150.arc
- @MYEDIT !outpass c:\file\private\editmax.arc
-
- The first line gives an exact filename. The second and third
- lines show the use of wildcards. The fourth line shows password
- protection, with an exclamation point (!) followed by the
- password. The fifth line shows a magic filename, an 'at' symbol
- (@) followed by the magic filename, followed by an exact drive,
- path and filename designation. The sixth line shows a magic
- filename with password protection.
-
- Note that in all cases, a password (if any) is always the second
- argument in an OKFILE entry.
-
- The next special file is the AVAIL file, and is designated by the
- 'Avail' statement in the configuration file. When someone
- requests the magic filename "FILES" BinkleyTerm will send this
- file. It is a list of the files you have available for request,
- in human readable form. This is a flat ASCII text file, and
- should feature the name of the file, and usually its size in
-
- BinkleyTerm Version 2.30 - User's Guide - Page 47
-
- bytes and a short description of the file. There are utilities
- available that can construct this file automatically based on
- your BBS system's internal listings. Of course, it could also be
- manually created.
-
- The next special file is called the ABOUT file, and is designated
- by the 'About' statement in the configuration file. When someone
- makes a request for the magic filename "ABOUT" or when someone
- makes an invalid WaZOO file request, this file is sent by
- BinkleyTerm. It normally contains a short advertisement about
- your system, as well as a notification that the calling system
- could possibly have made an invalid request. Again, this is a
- flat ASCII text file in human-readable form.
-
- The ABOUT file is sent only on failed WaZOO requests. The file
- is NOT sent on failed Bark requests.
-
- Finally, the last item that applies to file requests is the
- 'MaxReq' statement contained in the configuration file. A
- quantity is given with the statement which allows you to
- designate the maximum number of files that will be sent during
- one file request session. Refer to the Reference Guide section
- "Configuration File" for more information.
-
- It is possible to limit incoming file requests based on some
- basic criteria. For information, refer to the section "Security
- - Controlling File Requests."
-
- UPDATE REQUESTS
-
- Update requests are a method of obtaining an "update" of a file
- you already have, from another system you believe to have a newer
- copy. They differ from file requests in that when you construct
- an update request, you include a drive/path/file specification
- that points to an existing file on your system. Generally, DOS
- wildcards are acceptable. When BinkleyTerm connects with the
- desired remote, it will compare the date and time stamp on your
- copy of the file(s) to the date and time stamp of the same-named
- file(s) on the remote system. If the remote system has a newer
- copy of a given file, it will be sent. If it does not, no file
- will be sent. Note that the drive and path specification DO NOT
- need to be the same on the remote system; the drive and path you
- give refer only to YOUR copy of the file. The remote may have
- any file structure he or she desires.
-
- Update requests were originally implemented in SEAdog, a mailer
- from System Enhancement Associates, Inc. In addition to
- supporting update requests with SEAdog systems, BinkleyTerm
- implements a newly defined WaZOO update request for use other
- BinkleyTerm systems, or other mailers that support WaZOO update
- requests.
-
- Update requests are most commonly used now to handle GroupMail, a
- new method of sharing message areas developed by System
-
- BinkleyTerm Version 2.30 - User's Guide - Page 48
-
- Enhancement Associates, Inc. GroupMail generally requires update
- request capability on both ends of the connection.
-
- Like file requests, update requests are kept in .REQ files in
- your outbound area. In fact, a combination of update and file
- requests can be contained in the same physical .REQ file. An
- update request entry contains a filename, as well as a date and
- time code that corresponds to the date and time stamp of the file
- on your system. Because the date and time code is in a special
- format, it is not recommended that you attempt to create an
- update request entry yourself.
-
- At this writing, the oMMM mail packer (version 1.30 or higher)
- and the AMAX outbound utility (version 2.10 or higher) both
- support the creation of update requests in the manner that
- BinkleyTerm requires. Refer to the documentation for those
- programs for additional information on creating update requests.
- Certainly other utilities will eventually have this ability as
- well.
-
- Please note that in order for update requests to work, the remote
- system must have the file you want updated available for regular
- file request. You cannot update a file that would not otherwise
- be available for file request from the remote system.
-
- REQUEST RESPONSE FILES
-
- Incoming file and update requests are not always successful.
- BinkleyTerm supports the ability to dynamically generate a
- "response file." This file is a plain text file, built "on-the-
- fly" during a session, and sent in response to a failed (or
- optionally, a successful) file or update request. If you choose
- to implement request response files, the "about" file designated
- in your configuration file will no longer be sent. See "File
- Requests" for more information.
-
- Note that when a response file is sent, it is counted against the
- maximum number of file sent in response to a request, as
- designated by the 'MaxReq' statement in the configuration file.
- See "File Requests" or the Reference Guide section "Configuration
- File" for more information.
-
- The content of the response file is configured by you with a
- template file. The template file name is designated by the
- 'ReqTemplate' configuration file statement. As with file
- requests, you can also implement security controls with the
- request templates. See "Security - Response File Templates" for
- more details.
-
- Normally, the response file contains information such as the date
- and time the request was made, what file was requested, and why
- the request failed. You may wish to include information such as
- the times your system accepts requests, what magic filenames you
- support, and so on.
-
- BinkleyTerm Version 2.30 - User's Guide - Page 49
-
-
- Response files are named similar to outbound packets or request
- files. They are <net><node>.RSP, where <net> is a net number,
- and <node> is a node number. Both <net> and <node> are four-
- digit hexadecimal number with leading zeroes.
-
- A sample response file template, SAMPLE.TPL, is included with the
- BinkleyTerm distribution package. Use this sample as a starting
- point for your own response file template.
-
- The complete list of possible verbs for use in the response file
- can be found in the section "Response File Template" in the
- Reference Guide.
-
- FUNCTION REQUESTS
-
- Two additional special entries may be included in the OKFILE that
- operate similar to magic filenames. Called "magic" function
- requests, they allow an incoming request to trigger the operation
- of a program.
-
- $ Function Requests
-
- The first style uses a dollar sign ($) in the first column of an
- OKFILE entry, followed by a function request name. If the name
- is matched, then the command after the password (if any) is
- executed. In addition, two arguments which correspond to the net
- and node number of the calling system can be sent if desired by
- adding "%d %d" to the end of the OKFILE entry. For example:
-
- $INFO INFO.BAT %d %d
-
- If an incoming file request is for "INFO" then the program
- INFO.BAT would be executed, and it would receive two command line
- arguments that correspond to the net and node number
- respectively. For instance, if 141/491 requested "INFO" then the
- following would be issued to DOS for execution:
-
- INFO.BAT 141 491
-
- Another example of such an OKFILE entry would be:
-
- $CLEANUP !mypass CLEANUP.BAT %x %x
-
- In this case, a password is included as the second argument of
- the line, and must be matched by the incoming request in order
- for the program to be executed. Note also that in this example,
- "%x %x" was used, and would cause a hexadecimal representation of
- the net and node number to be sent as command line arguments to
- the program being executed. In our example, if 104/36 requests
- "CLEANUP" with a password of "mypass" then the following would be
- sent to DOS for execution:
-
- CLEANUP.BAT 68 24
-
- BinkleyTerm Version 2.30 - User's Guide - Page 50
-
-
- See "Function Request Notes" below for additional function
- request information.
-
- + Function Requests
-
- A second type of function request is also supported, and is
- designated by a plus sign (+) in the first column of an OKFILE
- entry. In this case, if the filename and optional password are
- matched, then the entire line from the incoming .REQ file is
- passed to DOS for processing, with the <zone>:<net>/<node>
- address appended as individual arguments to the command line. An
- example of an OKFILE entry might be:
-
- +GETREV !mypass
-
- If an incoming .REQ file from 141/491 contained the line:
-
- GETREV !mypass BT 1.50
-
- Then the following would be passed to DOS for execution:
-
- GETREV !mypass BT 1.50 1 141 491
-
- A program called GETREV would be executed, and would need to
- process or filter the command line as needed.
-
- Function requests are convenient for allowing a remote system to
- have a batch file or utility of some kind (not included) place a
- particular file on hold for a node for later pickup, to cause the
- system to send a particular file, to trigger some other sort of
- function or activity remotely, etc., etc.
-
- If a program called as part of a function request creates a file
- in the appropriate outbound area called <net><node>.QLO (where
- <net> and <node> are 4-digit hexadecimal numbers with leading
- zeroes), BinkleyTerm will treat this file as a legitimate "flow"
- (file attach) file and send the file(s) listed in it back to the
- caller as part of the request logic.
-
- Function Request Notes
-
- If a function request triggers a program or batch file to build a
- file attach (flow) file, then BinkleyTerm will process the file
- attach during the current session. In other words, if a file
- attach is generated during a function request, then the file(s)
- shown in the file attach will be sent during the current session.
-
- Note that the normal logic for the handling of .HLO (Hold file
- attaches) still applies; i.e., file(s) designated within a .HLO
- file will be sent only when the destination node polls for pick-
- up.
-
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 51
-
- A WORD ABOUT POINT NETWORKS
-
- BinkleyTerm is well suited to the task of being a "boss" (or host
- system) of a point network. Points are essentially a "system
- under a system" and allow the point operator to have limited
- access to the network without the normal requirements of keeping
- a system on-line at certain hours.
-
- Since point addressing is not part of the FidoNet standard at
- this time, certain "kludges" must be used in order to handle a
- point network.
-
- Essentially, the process involves using a private network
- address, and assigning node numbers to the points under the boss.
- For example, 1:104/36.17 (point #17 off of node 104/36) might
- actually be assigned 1052/17 for the purpose of transacting mail
- with the boss. For reference purposes the point is 1:104/36.17,
- but mail is actually held for 1052/17 to pick-up, and the point
- must call as 1052/17.
-
- Often times, private point addresses will make their way into
- EchoMail "SEEN-BY" lines. This could cause problems down the
- line if another system uses the same private address. For this
- reason, IT IS RECOMMENDED THAT YOUR PRIVATE NETWORK ADDRESS BE
- ASSIGNED BY THE INTERNATIONAL COORDINATOR. The International
- Coordinator requests that you adhere to this recommendation, and
- contact him directly for a private network number assignment. As
- a boss node, you may then use the network address to assign your
- points their own node address in the private net for the purpose
- of transacting mail.
-
- The International Coordinator can be reached at 1:1/0.
-
- To receive a private net number, the information that follows is
- needed. All information will be held in confidence, but is
- needed in case the International Coordinator needs to get a hold
- of the private net administrator. As soon as this information is
- received, the International Coordinator will issue a private net
- number:
-
- - Name of the Private Network Administrator
- - Name of the Private Network (if any)
- - Mailing Address
- - Voice Phone
- - Data Phone
- - FidoNet Node (if any)
- - Alternate E-Mail Addresses (i.e., Usenet, Bitnet, MCI
- Mail, Telex, etc., if any)
-
- Your cooperation in obtaining an assigned private network number
- for use on point networks will help ensure network integrity.
-
-
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 52
-
- +-------------+
- | +---------+ |
- | | Section | | BinkleyTerm User's Guide
- | | 4 | | PROBLEM SOLVING
- | +---------+ |
- +-------------+
-
- BINKLEYTERM SUPPORT
-
- Since BinkleyTerm is a product which is "free for the asking" you
- cannot expect a toll-free software support line (as much as we
- may want to provide you with one).
-
- The primary means of support is the BINKLEY EchoMail Conference.
- This conference is carried worldwide via FidoNet. Contact your
- EchoMail Coordinator or Hub for information on hooking into the
- conference, or finding a system that you can use to participate
- in the conference. The conference is monitored and read by the
- BinkleyTerm authors and beta testers.
-
- A secondary source of support is provided by BinkleyTerm HELP,
- Shawn Stoddard, at FidoNet 1:1/102.0. If you have an urgent
- question, or are unable to hook into the BINKLEY EchoMail
- Conference, send a NetMail message to BinkleyTerm HELP. Replies
- are issued as time and resources allow, so please be patient.
-
- TROUBLESHOOTING
-
- 3,000 pages of documentation would not entirely eliminate the
- potential for problems with the installation and operation of
- BinkleyTerm. Due to the wide variety of hardware and software
- configurations that BinkleyTerm may be used with, as well as the
- varying levels of experience of the BinkleyTerm user, problems
- will sometimes occur. This section attempts to present common
- problems and possible solutions.
-
- If there is not a solution to your problem presented here, please
- read over the appropriate sections of the manual again. If you
- still are having difficulty, place a message in the BINKLEY
- EchoMail conference, or contact BinkleyTerm HELP at 1:1/102.
-
- Baud Rate Locking Trouble
-
- Do not use BinkleyTerm's 'LockBaud' configuration file statement.
- Lock the baud rate of your FOSSIL instead.
-
- Outward Dial Aborting
-
- Many people installing BinkleyTerm mistakenly use the 'Suffix'
- option in their configuration file. Unlike most communications
- programs, BinkleyTerm by default adds a carriage return to the
- end of the dial string. 'Suffix' is used to add instructions to
- the end of the phone number, but BEFORE the carriage return. By
- adding a carriage return code (pipe symbol, |) with the 'Suffix'
-
- BinkleyTerm Version 2.30 - User's Guide - Page 53
-
- statement, you are essentially telling BinkleyTerm to send TWO
- carriage returns, yours, plus the default. With most modems,
- this will immediately abort the dialing process before it even
- gets started.
-
- In nearly all installations, the 'Suffix' statement WILL BE
- COMMENTED OUT. If deleting the 'Suffix' statement does not fix
- the problem, you may also try adding the 'NoCollide' and/or
- 'SlowModem' statements to the configuration file. Refer to the
- Reference Guide section "Configuration File" for more details.
-
- False Call Collision Reports
-
- In some installations, BinkleyTerm may abort the dialing process
- due to an incoming call, even when there is no incoming call.
- This is probably due to the modem reporting "RING" on both
- incoming and outgoing calls. Use the 'SameRing' configuration
- file option to partially disable the call collision feature; use
- the 'NoCollide' option to totally disable the feature.
-
- FOSSIL Driver Compatibility Problems
-
- The two most popular FOSSIL drivers in use with BinkleyTerm are
- Ray Gwinn's X00 and Bob Hartman's OpusComm, both of which are for
- the IBM PC and close compatibles. If one of the drivers fails to
- work correctly in your installation, please try the other.
-
- BinkleyTerm Will Not Recognize Node Addresses
-
- You have not compiled the nodelist correctly. Use ParseLst to
- compile a fully-zoned Version 6 nodelist for your system. To do
- this, make sure the following statements exist within your
- ParseLst configuration file: UseZone, Complete (or Gated), and
- Version6.
-
- TBBS Difficulty - BinkleyTerm Runtime Errors
-
- When used with TBBS, BinkleyTerm must be renamed MAILER.EXE.
- Since BT.EXE uses overlays to provide more efficient memory
- usage, it CANNOT be renamed. TBBS users should be certain to use
- BTBIG.EXE, the non-overlay version, on their systems, renaming it
- to MAILER.EXE before use.
-
- Some TBBS Sysops have patched TBBS.EXE to invoke BT.EXE, which
- allows them to use the overlaid version. While if this is done
- correctly it will probably cause no problems, we cannot recommend
- this course of action.
-
- DOS Shell Not Working Correctly
-
- BinkleyTerm is developed under Microsoft C. The MSC routines do
- not use COMSPEC to find COMMAND.COM, which is needed to perform a
- DOS shell or child process. COMMAND.COM must be found on the DOS
- path. Refer to your DOS documentation for information and
-
- BinkleyTerm Version 2.30 - User's Guide - Page 54
-
- instructions regarding COMSPEC, and the SET PATH command.
-
- Zone Support Does Not Operate Correctly
-
- Chances are excellent that you have not compiled the nodelist
- correctly. Although the actual entries for nodes in other zones
- do not need to be included in the compiled nodelist files, what
- are called "zone identifiers" DO need to be included in order for
- zone support to work. See the section "Nodelist" for more
- information on correct compilation of a nodelist. Another item
- to check is that outbound areas are created for the other zones
- to which you want to send mail. See "Zone Support" for
- information on how outbound areas for other zones are
- constructed.
-
- Date Rollover Problem
-
- BinkleyTerm keeps schedule information in binary form in a file
- named BINKLEY.SCD. If for some reason the file is newer than the
- current date and time, BinkleyTerm will report "Date Rollover
- Problem?" as this condition is usually indicative of a problem
- with DOS rolling the date over at midnight properly. If there
- appears to be no difficulty with date rollover, delete the
- BINKLEY.SCD file, and allow BinkleyTerm to contruct a new one the
- next time it is invoked. A date rollover problem sometimes does
- exist with certain versions of DOS. If the problem persists, a
- DOS upgrade may be indicated.
-
- GLOSSARY
-
- AMAX
-
- The name of a BinkleyTerm utility by Alan Applegate that
- handles various outbound mail manipulation functions.
-
- ARCmail
-
- Simply archived mail packets, processed with an ARC-
- compatible utility. Typically used to forward EchoMail
- messages due to the file compression inherent in the
- archiving process. Naming conventions correspond to a
- generally accepted method. See 'Mail Packet.'
-
- BBS
-
- An electronic bulletin board system. A method of
- communicating and sharing files with others by computer.
- Typically operated by hobbyists, free-of-charge.
-
- Carrier Detect
-
- A serial port line that is brought "high" (raised, given a
- "true" logical value) when carrier is present on the line,
- e.g., when the modem is connected to another modem.
-
- BinkleyTerm Version 2.30 - User's Guide - Page 55
-
-
- The modem raises and lowers this line.
-
- CD
-
- See "Carrier Detect."
-
- Compressed Mail
-
- Mail that has been compressed or "archived" with any one of
- several archiving utilities. Such mail is also known as
- ARCmail, ZOOmail, PAKmail, etc., depending on which
- archiving utility was used to compress the mail.
-
- ConfMail
-
- The name of a mail processing program by Bob Hartman for use
- in the Opus or Fido environments, or any other environment
- that uses a compatible message base.
-
- Continuous Mail
-
- A capability of a particular system to accept mail at any
- time of day, as opposed to being required to accept it only
- during certain pre-scheduled times.
-
- D'Bridge
-
- A commercial FidoNet mailer written by Chris Irwin.
-
- Data Terminal Ready
-
- A serial port line that is brought "high" (raised, given a
- "true" logical value) when the local terminal is ready for
- communications. A serial device (in our case a modem)
- connected to the serial port uses this line to detect
- whether the terminal (your PC and BinkleyTerm) are ready for
- communications activities. Normally, bringing the line
- "low" (lowering, giving a "false" logical value) causes a
- modem to disconnect from the telephone line.
-
- BinkleyTerm raises and lowers this line.
-
- DTR
-
- See "Data Terminal Ready."
-
- Dutchie
-
- A FidoNet mailer written by Henk Wevers.
-
- Dynamic Event
-
- A system event (see "Event") that stops when particular
-
- BinkleyTerm Version 2.30 - User's Guide - Page 56
-
- conditions (lack of mail of a certain type to be sent) are
- met.
-
- EchoMail
-
- A system devised by Jeff Rush for the automated sharing of
- message areas between systems, whereby messages are "echoed"
- from one system to another. Also known as conferences or
- EchoMail conferences.
-
- Errorlevel
-
- The name of a DOS environment variable; contains a value
- returned by a program on exit that indicates a certain pre-
- defined condition.
-
- Event
-
- A system occurrence at a pre-configured time, day-of-the-
- week, and/or date. Normally system limitations such as when
- to dial long distance are dependent on system events.
-
- Fido
-
- The original implementation of FidoNet and FidoNet protocol;
- a BBS software package.
-
- FidoNet
-
- The name of the original network that used FidoNet protocol,
- as designed by Tom Jennings.
-
- FidoNet Protocol
-
- A method of electronic mail transfer designed by Tom
- Jennings, as documented in the Fido Technical Standards
- Committee document FSC-0001.
-
- File Request
-
- The ability and associated methods of using extended FidoNet
- protocol to obtain a particular file automatically from one
- FidoNet system to another.
-
- FOSSIL Driver
-
- FOSSIL is an acronym for Fido/Opus/SEAdog Standard Interface
- Layer. Since not all computers capable of running MS-DOS
- are hardware compatible with the IBM PC, communications
- software typically written for the IBM PC may not operate on
- machines such as the DEC Rainbow, Sanyo 555 or Heath/Zenith
- 100.
-
- The FOSSIL provides a consistent manner for a communications
-
- BinkleyTerm Version 2.30 - User's Guide - Page 57
-
- program to access the communications ports, keyboard and
- screen. The FOSSIL is typically installed at boot-time,
- either as a device driver or as a program. The driver MUST
- be installed prior to running any FOSSIL compatible
- software, BinkleyTerm included, or an error message will be
- generated, and the program will abort.
-
- FOSSIL drivers are normally available from systems that
- distribute Opus-CBCS and/or BinkleyTerm software. Examples
- of FOSSIL drivers are: OpusComm by Bob Hartman for the IBM
- PC and close compatibles, X00 by Ray Gwinn for the IBM PC
- and compatibles, and DECCOMM by Vince Perriello for the DEC
- Rainbow.
-
- FrontDoor
-
- A FidoNet mailer written by Joaquim Homrighausen.
-
- FSC001
-
- In BinkleyTerm, an abbreviation that indicates that a mail
- session corresponding to the FSC-0001 standard is in use.
- FSC-0001 is a standards document written by the FidoNet
- Technical Standards Committee.
-
- GroupMail
-
- A method of sharing message areas devised by System
- Enhancement Associates, Inc., similar to EchoMail, except
- that responsibility for obtaining mail is placed on the
- receiving system, not the sending system as with EchoMail.
- Based on usage of update requests.
-
- Hold Area
-
- See "Outbound Area."
-
- Inbound Area
-
- Also known as the "NetFiles" area, this is a special sub-
- directory set aside for the acceptance of incoming mail or
- files from other network systems.
-
- Mail Packet
-
- A unit of mail as defined in the FidoNet Technical Standards
- Committee document FSC-0001.
-
- Mailer
-
- A program that acts as a FidoNet-compatible mail handler,
- using FidoNet protocol. Normally, a mailer answers the
- phone, accepts and/or sends mail, and possibly passes human
- callers on to a BBS.
-
- BinkleyTerm Version 2.30 - User's Guide - Page 58
-
-
- msged
-
- An Opus/Fido compatible message reader/editor by Jim Nutt.
-
- Net
-
- A subset of a FidoNet compatible network, usually a
- collection of nodes within a metropolitan area.
-
- NetFiles
-
- Files received from other systems in the network; also a
- special sub-directory set aside for the reception of such
- files.
-
- NetMail
-
- Person-to-person mail sent through the network.
-
- Network
-
- As it applies to BinkleyTerm, a collection of nodes that are
- FidoNet compatible, such as the FidoNet network itself, or
- others such as EggNet, AlterNet, RBBS-Net, etc.
-
- Also, a division of a full network. See "Net" above.
-
- Node
-
- A FidoNet compatible system, represented by a node address,
- and listed in a nodelist.
-
- Nodelist
-
- A listing of FidoNet nodes.
-
- oMMM
-
- A packing program (packer) originally designed for Opus-
- CBCS, but now widely used with BinkleyTerm.
-
- Opus-CBCS
-
- "The Opus Computer Based Conversation System," a BBS
- designed by Wynn Wagner III. Uses ".MSG" message base
- (compatible with Fido BBS program). Contains built-in
- FidoNet compatible mailer.
-
- Outbound Area
-
- Also known as the "Hold Area," this is a special sub-
- directory set aside specifically for holding mail waiting to
- be sent to or picked-up by its destination.
-
- BinkleyTerm Version 2.30 - User's Guide - Page 59
-
-
- Packer
-
- A program that processes mail entered on a system, and
- prepares it for sending by the mailer.
-
- Packet
-
- Within FidoNet, a message unit conforming to FSC-0001
- specifications.
-
- With file transfer protocols, a block, or "piece" of the
- file transfer. Normally a pre-determined size in bytes.
-
- Point
-
- A point is an extension of a regular, fully qualified
- FidoNet node. The term is derived from the node address
- format, 1:104/36.2 for example, where 1 is a zone, 104 a
- net, 36 a node, and 2 is the point.
-
- Primarily, Points are intended to provide an method of
- participating in EchoMail conferences in an off-line state.
- The conferences are packed and held for the Point system by
- the Boss, a system which carries the desired conference(s)
- and is willing to route them to the Point. The Point system
- 'polls' the Boss for the conferences, which are unpacked and
- read off-line on the Point system. Responses are packed and
- sent to Boss in much the same manner as is done by regular
- FidoNet nodes.
-
- Generally, Points never interact with regular nodes, only
- with their Boss, since Point systems are not listed in the
- FidoNet nodelist.
-
- QuickBBS
-
- A BBS program designed by Adam Hudson, which uses
- configurable menuing and a database-style message base.
- Requires mail processing software designed specifically for
- its message format.
-
- Region
-
- A subset of a FidoNet compatible network, a collection of
- nodes within a broad geographical area. With regard to
- FidoNet addressing, a region is handled the same way as a
- network. With regard to operational infrastructure, this is
- a higher level than a net.
-
- Scan
-
- Usually associated with EchoMail processing, "scanning" is
- the process of taking new messages from a form usable by a
-
- BinkleyTerm Version 2.30 - User's Guide - Page 60
-
- BBS program or message editor and preparing them for sending
- via the network by placing them in standard packet and/or
- compressed mail format.
-
- SEAdog
-
- A commercial FidoNet mailer by System Enhancement
- Associates, Inc.
-
- SEAlink
-
- A variant of Xmodem, a robust file transfer protocol
- featuring sliding windows, good error trapping and extended
- file information. Superior to Xmodem for use on difficult
- or satellite connected links.
-
- Sirius
-
- An Opus/Fido compatible message reader/editor by Bob Klahn.
-
- Sysop
-
- System operator; the person who operates a BBS, and/or the
- operator of a FidoNet node.
-
- TBBS
-
- A commercial BBS software package by eSoft, Inc.
-
- Telink
-
- An Xmodem variant, a file transfer protocol that is
- essentially Xmodem with a file information packet.
-
- Terminal Mode
-
- A BinkleyTerm mode within which the software may be used for
- manual, direct connections with remote modem-equipped
- computers.
-
- Toss
-
- Usually associated with EchoMail processing, "tossing" is
- the process of unpacking compressed mail into a form usable
- by a particular BBS program or message editor.
-
- TSYNC
-
- A signal sent to a FidoNet system from another FidoNet
- system attempting to pass mail traffic. TSYNC is
- essentially a "handshake" between the sending and receiving
- systems to synchronize the mail session.
-
-
-
- BinkleyTerm Version 2.30 - User's Guide - Page 61
-
- Unattended Mode
-
- A BinkleyTerm mode within which FidoNet electronic mail may
- be sent or received.
-
- Undialable
-
- A term for nodes which will no longer be called
- automatically by the system until manually reset. The
- result of excessive unsuccessful connections with the remote
- system in an attempt to send mail.
-
- Unpacker
-
- A mail processing program that takes mail as received
- (compressed mail and/or packets) and places it into a form
- usable by a given type of BBS program or message editor.
-
- Update Request
-
- The ability and associated methods of requesting only a
- newer copy of a file located on one FidoNet system, if a
- newer copy exists, from another FidoNet system, using
- extended FidoNet protocol.
-
- VFOSSIL (Video FOSSIL Driver)
-
- A standard resident driver that allows a software program to
- access display hardware in a consistent manner regardless of
- hardware compatibility. This is an extension of the FOSSIL
- driver, and may not be supported by all FOSSIL drivers at
- this time. A VFOSSIL allows much faster access to the video
- display hardware than a FOSSIL driver alone would support.
-
- WaZOO
-
- An open architecture method of electronic mail transfer
- designed by Wynn Wagner, and originally used with Opus-CBCS.
- Various protocols can be used under WaZOO, including ZedZap,
- a slightly modified Zmodem, and DietIFNA, a SEAlink method.
- See 'YooHoo.'
-
- Xmodem
-
- One of the first of its type, a file transfer protocol
- designed by Ward Christensen. Although technologically
- behind other newer, more robust protocols, Xmodem is the
- most widely supported and implemented file transfer protocol
- in dial-up use.
-
- YooHoo
-
- A method of mail transfer session negotiation which
- determines if the remote system is capable of handling
-
- BinkleyTerm Version 2.30 - User's Guide - Page 62
-
- WaZOO. FidoNet systems that do not support WaZOO will
- simply disregard the YooHoo; systems capable of supporting
- it will answer affirmatively, and a WaZOO session will be
- initiated. See 'WaZOO.' YooHoo is defined in the Fido
- Technical Standards Committee document FSC-0005.
-
- Zmodem
-
- A robust streaming file transfer protocol featuring advanced
- error recovery techniques, variable packet sizing, good
- error detection and extended file information. Extremely
- efficient, yet complex. Highly effective with difficult
- connections.
-
- Zone
-
- A large geographical sub-division in the network, the
- highest level of the accepted FidoNet addressing scheme.
- Broad areas such as continents are given zone designations.
- Also used to specify a particular alternate network.
-
- ZOOmail
-
- Simply archived mail packets, processed with the ZOO
- utility. Typically used to forward EchoMail messages due to
- the file compression inherent in the archiving process.
- Naming conventions correspond to a generally accepted
- method. See 'Mail Packet.'
-
-
-
-